ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
npm
GHSA-4q69-q4q7-x82c
High severity vulnerability that affects rendertron
Rendertron 1.0.0 includes an _ah/stop route to shutdown the Chrome instance responsible for serving render requests to all users. Visiting this route with a GET request allows any unauthorized remote attacker to disable the core service of the application.
{'CVE-2017-18353'}
2021-09-01T17:52:46Z
2019-01-04T17:41:46Z
HIGH
null
null
{'https://github.com/GoogleChrome/rendertron', 'https://github.com/GoogleChrome/rendertron/pull/88', 'https://bugs.chromium.org/p/chromium/issues/detail?id=759111', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18353', 'https://github.com/advisories/GHSA-4q69-q4q7-x82c', 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}
null
npm
GHSA-f4hq-453j-p95f
Open redirect in Slashify
The package is an Express middleware that normalises routes by stripping any final slash, redirecting, for example, `bookings/latest/` to `bookings/latest`. However, it does not validate the path it redirects to in any way. In particular, if the path starts with two slashes (or two backslashes, or a slash and a backslash, etc.) it may redirect to a different domain. Consider the [example from the docs](https://www.npmjs.com/package/slashify#usage). Assume we have run it and started a server on `localhost:3000`, then visiting `localhost:3000///github.com/` redirects you to https://github.com. ## Recommendation This vulnerability is currently un-patched in the `slashify` package so there is no known safe version of this package. Discontinuing use of `slashify` is recommended.
{'CVE-2021-3189'}
2021-04-02T13:58:31Z
2021-02-05T20:43:34Z
HIGH
null
{'CWE-601'}
{'https://security.netapp.com/advisory/ntap-20210401-0004/', 'https://www.npmjs.com/package/slashify', 'https://github.com/divshot/slashify', 'https://securitylab.github.com/advisories/GHSL-2020-199-open-redirect-slashify', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3189'}
null
npm
GHSA-fv9m-f7w4-889c
Exfiltrates Discord login tokens to pastebin in discordi.js
The `discordi.js` package is malware that attempts to discover and exfiltrate a user's [Discord](https://discordapp.com/) credentials, sending them to pastebin. All versions have been unpublished from the npm registry. ## Recommendation Do not install / use this module. It has been unpublished from the npm registry but may exist in some caches. Any users that logged into Discord using this library will need to change their credentials.
{'CVE-2017-16207'}
2020-08-31T18:27:12Z
2018-08-06T21:43:03Z
MODERATE
null
{'CWE-506'}
{'https://nodesecurity.io/advisories/545', 'https://github.com/advisories/GHSA-fv9m-f7w4-889c', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16207', 'https://www.npmjs.com/advisories/545'}
null
npm
GHSA-qcc9-q247-3m2m
Malicious Package in js-regular
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:17:10Z
2020-09-03T19:46:49Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1129'}
null
npm
GHSA-qx4v-6gc5-f2vv
Regular Expression Denial of Service
A Regular Expression Denial of Service vulnerability was discovered in esm before 3.1.0. The issue is that esm's find-indexes is using the unescaped identifiers in a regex, which, in this case, causes an infinite loop.
null
2021-02-25T17:20:28Z
2019-06-20T14:32:56Z
MODERATE
null
{'CWE-400'}
{'https://github.com/standard-things/esm/commit/c41e001d81a5a52b0d2d1722b1c2af04d997c05b', 'https://github.com/standard-things/esm/issues/694'}
null
npm
GHSA-58g2-9fqr-36q2
Prototype Pollution in Proto
This affects all versions of package Proto. It is possible to inject pollute the object property of an application using Proto by leveraging the merge function.
{'CVE-2021-23426'}
2021-09-10T17:08:40Z
2021-09-02T22:01:01Z
HIGH
null
{'CWE-1321'}
{'https://github.com/adriancmiranda/Proto', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23426', 'https://snyk.io/vuln/SNYK-JS-PROTO-1316301', 'https://www.npmjs.com/package/Proto'}
null
npm
GHSA-pgf8-28gg-vpr6
Path traversal
### Impact A malicious actor could read sensitive files from the environment where TechDocs documentation is built and published by setting a particular path for `docs_dir` in `mkdocs.yml`. These files would then be available over the TechDocs backend API. This vulnerability is mitigated by the fact that an attacker would need access to modify the `mkdocs.yml` in the documentation source code, and would also need access to the TechDocs backend API. ### Patches The vulnerability is patched in the `0.6.3` release of `@backstage/techdocs-common`. ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Backstage repository](https://github.com/backstage/backstage) * Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
{'CVE-2021-32662'}
2021-06-07T18:55:30Z
2021-06-04T19:09:20Z
MODERATE
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32662', 'https://github.com/backstage/backstage/releases/tag/release-2021-05-27', 'https://github.com/backstage/backstage/security/advisories/GHSA-pgf8-28gg-vpr6', 'https://github.com/backstage/backstage/commit/8cefadca04cbf01d0394b0cb1983247e5f1d6208'}
null
npm
GHSA-j665-rvj7-2jv9
Code Injection in mosc
mosc through 1.0.0 is vulnerable to Arbitrary Code Execution. User input provided to `properties` argument is executed by the `eval` function, resulting in code execution.
{'CVE-2020-7672'}
2021-07-29T18:11:51Z
2021-05-17T21:00:17Z
HIGH
null
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7672', 'https://snyk.io/vuln/SNYK-JS-MOSC-571492'}
null
npm
GHSA-q42c-rrp3-r3xm
Malicious Package in commmander
All versions of `commmander` contain malicious code . The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. Upon require the package attempts to start a cryptocurrency miner using coin-hive. ## Recommendation Remove the package from your environment and verify whether your system is running the cryptocurrency miner.
null
2021-09-30T22:02:15Z
2020-09-11T21:13:44Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/923'}
null
npm
GHSA-rj38-87f3-93p6
Downloads Resources over HTTP in limbus-buildgen
Affected versions of `limbus-buildgen` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `limbus-buildgen`. ## Recommendation Update to version 0.1.1 or later.
{'CVE-2016-10674'}
2021-01-07T22:31:53Z
2019-02-18T23:42:27Z
HIGH
null
{'CWE-311'}
{'https://nodesecurity.io/advisories/276', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10674', 'https://www.npmjs.com/advisories/276', 'https://github.com/advisories/GHSA-rj38-87f3-93p6'}
null
npm
GHSA-46hv-7769-j7rx
Unauthorized File Access in harp
Affected versions of `harp` are vulnerable to Unauthorized File Access. The package states that it ignores files and directories with names that start with an underscore, such as `_secret-folder`. If the underscore character is URL encoded the server delivers the file. ## Recommendation Upgrade to version `0.40.2` or later.
{'CVE-2019-5437'}
2021-06-03T17:09:41Z
2019-06-13T16:12:22Z
MODERATE
null
{'CWE-548'}
{'https://github.com/sintaxi/harp/commit/1ec790baeeb2bfdb4584f1998af3d10a8fa31210', 'https://www.npmjs.com/advisories/807', 'https://hackerone.com/reports/453820', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5437'}
null
npm
GHSA-6343-m2qr-66gf
Malicious Package in js-sja3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T17:14:57Z
2020-09-03T23:10:41Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1291'}
null
npm
GHSA-w457-6q6x-cgp9
Prototype Pollution in handlebars
Versions of `handlebars` prior to 3.0.8 or 4.3.0 are vulnerable to Prototype Pollution leading to Remote Code Execution. Templates may alter an Objects' `__proto__` and `__defineGetter__` properties, which may allow an attacker to execute arbitrary code through crafted payloads. ## Recommendation Upgrade to version 3.0.8, 4.3.0 or later.
{'CVE-2019-19919'}
2021-07-26T21:51:06Z
2019-12-26T17:58:13Z
CRITICAL
null
{'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-19919', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19919', 'https://github.com/wycats/handlebars.js/issues/1558', 'https://github.com/wycats/handlebars.js/commit/2078c727c627f25d4a149962f05c1e069beb18bc', 'https://www.npmjs.com/advisories/1164'}
null
npm
GHSA-g37j-v5gh-g25c
Malicious Package in js-shi3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T17:14:07Z
2020-09-03T23:06:48Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1288'}
null
npm
GHSA-49c6-3wr4-8jr4
Malicious Package in malicious-npm-package
All versions of `malicious-npm-package` contain malicious code. The malware targets Windows systems. It runs a powershell command that downloads an executable file from a remote server and runs it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:07:48Z
2020-09-04T15:05:26Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1323'}
null
npm
GHSA-hxxf-q3w9-4xgw
Malicious Package in eslint-scope
Version 3.7.2 of `eslint-scope` was published without authorization and was found to contain malicious code. This code would read the users `.npmrc` file and send any found authentication tokens to 2 remote servers. ## Recommendation The best course of action if you found this package installed in your environment is to revoke all your npm tokens. You can find instructions on how to do that here. https://docs.npmjs.com/getting-started/working_with_tokens#how-to-revoke-tokens
null
2021-09-14T17:35:41Z
2018-07-12T19:52:02Z
CRITICAL
null
{'CWE-506'}
{'https://github.com/eslint/eslint-scope/issues/39', 'https://snyk.io/vuln/SNYK-JS-ESLINTSCOPE-11120', 'https://github.com/advisories/GHSA-hxxf-q3w9-4xgw', 'https://www.npmjs.com/advisories/673', 'https://eslint.org/blog/2018/07/postmortem-for-malicious-package-publishes', 'https://github.com/eslint/eslint-scope'}
null
npm
GHSA-8g4m-cjm2-96wq
Sandbox escape in notevil and argencoders-notevil
This affects all versions of package notevil; all versions of package argencoders-notevil. It is vulnerable to Sandbox Escape leading to Prototype pollution. The package fails to restrict access to the main context, allowing an attacker to add or modify an object's prototype. **Note:** This vulnerability derives from an incomplete fix in [SNYK-JS-NOTEVIL-608878](https://security.snyk.io/vuln/SNYK-JS-NOTEVIL-608878). This package has been deprecated.
{'CVE-2021-23771'}
2022-03-25T16:47:42Z
2022-03-18T00:01:11Z
MODERATE
null
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23771', 'https://snyk.io/vuln/SNYK-JS-NOTEVIL-2385946', 'https://github.com/mmckegg/notevil', 'https://snyk.io/vuln/SNYK-JS-ARGENCODERSNOTEVIL-2388587'}
null
npm
GHSA-6jmr-jfh7-xg3h
False-positive validity for NFT1 genesis transactions
### Impact In the npm package named "slp-validate", versions prior to 1.2.2 are vulnerable to false-positive validation outcomes for the NFT1 Child Genesis transaction type. A poorly implemented SLP wallet or opportunistic attacker could create a seemingly valid NFT1 child token without burning any of the NFT1 Group token type as is required by the NFT1 specification. ### Patches npm package "slp-validate" has been patched and is published and tagged as version 1.2.2. ### Workarounds Upgrade to slp-validate 1.2.2. ### References * Package location: https://www.npmjs.com/package/slp-validate * SLP NFT1 spec: https://slp.dev/specs/slp-nft-1/#nft1-protocol-requirements * Git commit hash fixing this issue: https://github.com/simpleledger/slp-validate.js/commit/3963cf914afae69084059b82483da916d97af65c * Unit tests have been added to assist validator implementations in avoiding this bug: https://github.com/simpleledger/slp-unit-test-data/commit/8c942eacfae12686dcf1f3366321445a4fba73e7 ### For more information If you have any questions or comments about this advisory please open an issue in the [slp-validate](https://github.com/simpleledger/slp-validate.js/issues) repository.
{'CVE-2020-15131'}
2021-01-08T21:00:17Z
2020-07-30T14:58:53Z
CRITICAL
null
{'CWE-697'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15131', 'https://github.com/simpleledger/slp-validate.js/commit/3963cf914afae69084059b82483da916d97af65c', 'https://github.com/simpleledger/slp-validate.js/security/advisories/GHSA-6jmr-jfh7-xg3h'}
null
npm
GHSA-j59f-6m4q-62h6
Improper Key Verification in ipns
Versions 0.1.1 or 0.1.2 of `ipns` are vulnerable to improper key validation. This is due to the public key verification was not being performed properly, resulting in any key being valid. ## Recommendation Update to version 0.1.3 or later.
null
2021-08-04T21:17:50Z
2019-05-30T17:28:48Z
HIGH
null
{'CWE-287'}
{'https://github.com/ipfs/js-ipns/commit/33684e356f1f2fdcd99b2fb85fcc5d52223769a0', 'https://www.npmjs.com/advisories/693'}
null
npm
GHSA-x6fg-f45m-jf5q
Regular Expression Denial of Service in semver
Versions 4.3.1 and earlier of `semver` are affected by a regular expression denial of service vulnerability when extremely long version strings are parsed. ## Recommendation Update to version 4.3.2 or later
{'CVE-2015-8855'}
2021-09-21T22:15:35Z
2017-10-24T18:33:36Z
HIGH
null
null
{'https://nodesecurity.io/advisories/31', 'https://www.npmjs.com/advisories/31', 'http://www.securityfocus.com/bid/86957', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8855', 'https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_ReDoS', 'https://github.com/advisories/GHSA-x6fg-f45m-jf5q', 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}
null
npm
GHSA-p33q-w45h-2hcj
Malicious Package in 4equest
All versions of `4equest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T13:44:09Z
2020-09-02T18:30:03Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/837'}
null
npm
GHSA-55r9-7mf8-m382
Cross-site Scripting in edge.js
Edge is a logical and batteries included template engine for Node.js. This affects the package edge.js before 5.3.2. A type confusion vulnerability can be used to bypass input sanitization when the input to be rendered is an array (instead of a string or a SafeValue), even if {{ }} are used.
{'CVE-2021-23443'}
2022-05-04T03:38:31Z
2021-09-22T20:36:46Z
MODERATE
null
{'CWE-79', 'CWE-843'}
{'https://snyk.io/vuln/SNYK-JS-EDGEJS-1579556', 'https://github.com/edge-js/edge/commit/fa2c7fde86327aeae232752e89a6e37e2e469e21', 'https://github.com/edge-js/edge', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23443'}
null
npm
GHSA-pfr3-87q3-65rc
Cross-site Scripting in vmd
vmd through 1.34.0 allows 'div class="markdown-body"' XSS, as demonstrated by Electron remote code execution via require('child_process').execSync('calc.exe') on Windows and a similar attack on macOS.
{'CVE-2021-33041'}
2021-05-25T20:47:12Z
2022-02-10T23:46:28Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-33041', 'https://github.com/yoshuawuyts/vmd/issues/137', 'https://www.npmjs.com/package/vmd'}
null
npm
GHSA-vp77-fqqp-79j8
Prototype Pollution in decal
This affects all versions of package decal. The vulnerability is in the set function.
{'CVE-2020-28449'}
2021-03-22T22:39:06Z
2021-04-13T15:20:27Z
HIGH
null
{'CWE-400', 'CWE-1321'}
{'https://www.npmjs.com/package/decal', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28449', 'https://github.com/gigafied/decal.js/blob/master/src/utils/set.js%23L45-L73', 'https://snyk.io/vuln/SNYK-JS-DECAL-1051007'}
null
npm
GHSA-mgv2-57vj-99xc
Low severity vulnerability that affects eye.js
## Test breaking ### Impact In v1.2.0, tests are broken: all tests are always succeeding. If tests are looking for security vulnerabilities, these were compromised. ### Patches Users should upgrade to `v1.2.1` ### Workarounds Users who don't use eye.js for looking for vulnerabilities are safe. Upgrading will just fix some bugs. ### For more information If you have any questions or comments about this advisory: * Open an issue in [EyeJS](https://github.com/arguiot/EyeJS) * Email us at [arguiot@gmail.com](mailto:arguiot@gmail.com)
null
2021-12-03T14:39:45Z
2019-10-07T16:54:24Z
LOW
null
null
{'https://github.com/arguiot/EyeJS', 'https://github.com/advisories/GHSA-mgv2-57vj-99xc', 'https://github.com/arguiot/EyeJS/security/advisories/GHSA-mgv2-57vj-99xc'}
null
npm
GHSA-2wpq-vvw6-67wr
Hijacked Environment Variables in nodecaffe
The `nodecaffe` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16070'}
2021-09-16T20:56:28Z
2018-08-29T23:38:35Z
CRITICAL
null
{'CWE-506', 'CWE-433'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16070', 'https://nodesecurity.io/advisories/509', 'https://www.npmjs.com/advisories/509'}
null
npm
GHSA-p7w2-mc6m-mfx2
Malicious Package in scroool
Version 0.1.7 of `scroool` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:41:26Z
2020-09-11T21:22:25Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/944'}
null
npm
GHSA-f2c5-997w-7f5c
Cross-site Scripting in peertube
peertube is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). It was found that one could upload a SVG image and then send the url of that to other users and when they open the link we can get their complete session keys as the session keys stored in local storage and with Javascript easily can be stolen by attackers.
{'CVE-2021-3780'}
2021-09-24T13:07:20Z
2021-09-20T20:42:41Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/282807a8-4bf5-4fe2-af62-e05f945b3d65', 'https://github.com/chocobozzz/peertube', 'https://github.com/chocobozzz/peertube/commit/0ea2f79d45b301fcd660efc894469a99b2239bf6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3780'}
null
npm
GHSA-qjf4-7642-c57p
Downloads Resources over HTTP in unicode
Affected versions of `unicode` insecurely download resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation Update to version 9.0.0 or later.
{'CVE-2016-10578'}
2021-01-08T21:18:41Z
2019-02-18T23:51:52Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/161', 'https://nodesecurity.io/advisories/161', 'https://github.com/advisories/GHSA-qjf4-7642-c57p', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10578'}
null
npm
GHSA-488m-6gh8-9j36
Moderate severity vulnerability that affects bracket-template
bracket-template suffers from reflected XSS possible when variable passed via GET parameter is used in template
{'CVE-2018-3735'}
2020-06-16T20:57:50Z
2018-07-27T17:05:06Z
MODERATE
null
{'CWE-79'}
{'https://hackerone.com/reports/317125', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3735', 'https://github.com/advisories/GHSA-488m-6gh8-9j36'}
null
npm
GHSA-mx3x-ghqm-r43h
Prototype pollution vulnerability in 'predefine'
Prototype pollution vulnerability in 'predefine' versions 0.0.0 through 0.1.2 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2020-28280'}
2021-10-08T22:13:34Z
2021-10-12T16:27:18Z
CRITICAL
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28280', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28280', 'https://github.com/bigpipe/predefine', 'https://github.com/bigpipe/predefine/blob/238137e3d1b8288ff5d7529c3cbcdd371888c26b/index.js#L284'}
null
npm
GHSA-p82g-2xpp-m5r3
Cross-Site Scripting in dojo
Versions of `dojo` prior to 1.2.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize HTML code in user-controlled input, allowing attackers to execute arbitrary JavaScript in the victim's browser. ## Recommendation Upgrade to version 1.2.0 or later.
{'CVE-2015-5654'}
2021-09-28T16:55:57Z
2020-09-11T21:18:05Z
MODERATE
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/973', 'http://www-01.ibm.com/support/docview.wss?uid=swg21975256', 'http://jvndb.jvn.jp/jvndb/JVNDB-2015-000153', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5654', 'http://www.securityfocus.com/bid/77026', 'https://snyk.io/vuln/SNYK-JS-DOJO-174933', 'http://jvn.jp/en/jp/JVN13456571/index.html', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5654', 'http://www.securitytracker.com/id/1034848'}
null
npm
GHSA-4gp3-p7ph-x2jr
OS Command Injection in devcert-sanscache
devcert-sanscache before 0.4.7 allows remote attackers to execute arbitrary code or cause a Command Injection via the exec function. The variable `commonName` controlled by user input is used as part of the `exec` function without any sanitization.
{'CVE-2019-10778'}
2021-08-23T15:12:51Z
2020-04-14T23:09:00Z
CRITICAL
null
{'CWE-78'}
{'https://github.com/guybedford/devcert/commit/571f4e6d077f7f21c6aed655ae380d85a7a5d3b8', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10778', 'https://snyk.io/vuln/SNYK-JS-DEVCERTSANSCACHE-540926'}
null
npm
GHSA-3mpr-hq3p-49h9
Prototype Pollution in mixin-deep
Versions of `mixin-deep` before 1.3.1 are vulnerable to prototype pollution via merging functions. ## Recommendation Update to version 1.3.1 or later.
{'CVE-2018-3719'}
2020-08-31T18:28:31Z
2018-07-26T15:10:54Z
LOW
null
{'CWE-471'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3719', 'https://github.com/advisories/GHSA-3mpr-hq3p-49h9', 'https://github.com/jonschlinkert/mixin-deep/commit/578b0bc5e74e14de9ef4975f504dc698796bdf9c', 'https://hackerone.com/reports/311236', 'https://www.npmjs.com/advisories/578'}
null
npm
GHSA-ww4j-c2rq-47q8
Command injection in ts-process-promises
This affects all versions of package ts-process-promises. The injection point is located in line 45 in main entry of package in lib/process-promises.js.
{'CVE-2020-7784'}
2021-01-12T23:54:52Z
2021-01-13T18:22:28Z
CRITICAL
null
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7784', 'https://snyk.io/vuln/SNYK-JS-TSPROCESSPROMISES-1048334'}
null
npm
GHSA-7vq3-wcjw-3fxh
Directory Traversal in lab6.brit95
Affected versions of `lab6.brit95` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16140'}
2020-08-31T18:24:33Z
2018-07-23T20:48:53Z
HIGH
null
{'CWE-22'}
{'https://github.com/advisories/GHSA-7vq3-wcjw-3fxh', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16140', 'https://nodesecurity.io/advisories/475', 'https://www.npmjs.com/advisories/475', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/lab6.brit95'}
null
npm
GHSA-83rx-c8cr-6j8q
Insecure Default Configuration in tesseract.js
Versions of `tesseract.js` prior to 1.0.19 default to using a third-party proxy. Requests may be proxied through `crossorigin.me` which clearly states is not suitable for production use. This may lead to instability and privacy violations. ## Recommendation Upgrade to version 1.0.19 or later.
null
2021-08-04T21:33:58Z
2019-06-05T20:48:55Z
MODERATE
null
{'CWE-829'}
{'https://github.com/naptha/tesseract.js/commit/679eba055f2a4271558e86beec3d1b70cae3fb28', 'https://www.npmjs.com/advisories/792', 'https://snyk.io/vuln/SNYK-JS-TESSERACTJS-174085', 'https://github.com/naptha/tesseract.js/pull/267'}
null
npm
GHSA-rjqq-98f6-6j3r
Improper Input Validation in sanitize-html
Apostrophe Technologies sanitize-html before 2.3.1 does not properly handle internationalized domain name (IDN) which could allow an attacker to bypass hostname whitelist validation set by the "allowedIframeHostnames" option.
{'CVE-2021-26539'}
2022-04-27T19:14:02Z
2021-05-06T16:10:05Z
MODERATE
null
{'CWE-20'}
{'https://github.com/apostrophecms/sanitize-html/pull/458', 'https://github.com/apostrophecms/sanitize-html', 'https://github.com/apostrophecms/sanitize-html/blob/main/CHANGELOG.md#231-2021-01-22', 'https://advisory.checkmarx.net/advisory/CX-2021-4308', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26539'}
null
npm
GHSA-g2c4-4m64-vxm3
Malicious Package in buffer-yor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:25:10Z
2020-09-03T22:15:25Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1254'}
null
npm
GHSA-c27r-x354-4m68
HMAC-SHA1 signatures can bypass validation via key confusion
### Impact An attacker can inject an HMAC-SHA1 signature that is valid using only knowledge of the RSA public key. This allows bypassing signature validation. ### Patches Version 2.0.0 has the fix. ### Workarounds The recommendation is to upgrade. In case that is not possible remove the 'http://www.w3.org/2000/09/xmldsig#hmac-sha1' entry from SignedXml.SignatureAlgorithms.
null
2020-10-27T20:35:52Z
2020-10-27T20:39:46Z
HIGH
null
{'CWE-287'}
{'https://github.com/yaronn/xml-crypto/security/advisories/GHSA-c27r-x354-4m68', 'https://github.com/yaronn/xml-crypto/commit/3d9db712e6232c765cd2ad6bd2902b88a0d22100', 'https://www.npmjs.com/package/xml-crypto'}
null
npm
GHSA-qmxf-fxq7-w59f
Malicious Package in angular-material-sidenav-rnd
Version 0.1.1 of `angular-material-sidenav-rnd` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 0.1.1 of this module is found installed you will want to replace it with a version before or after 0.1.1. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2021-09-24T14:46:00Z
2020-09-01T19:43:53Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/615', 'https://github.com/sovanna/angular-material-sidenav', 'https://snyk.io/vuln/SNYK-JS-ANGULARMATERIALSIDENAVRND-451015', 'https://github.com/musabgosset/angular-material-sidenav'}
null
npm
GHSA-h3cq-j957-vhxg
Cross-site Scripting in fullpage.js
using fullpage.js you can create a anchor tag . But when put href in anchor then it does not sanitize the url which allow for a break in the context of anchor element and can add our new element.
{'CVE-2022-1330'}
2022-04-22T20:26:49Z
2022-04-13T00:00:16Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-1330', 'https://github.com/alvarotrigo/fullpage.js', 'https://huntr.dev/bounties/08d2a6d0-772f-4b05-834e-86343f263c35', 'https://github.com/alvarotrigo/fullpage.js/commit/e7a5db42711700c8a584e61b5e532a64039fe92b', 'https://github.com/alvarotrigo/fullPage.js/pull/4360'}
null
npm
GHSA-724c-6vrf-99rq
Sensitive Data Exposure in loopback
Versions of `loopback` prior to 3.26.0 (3.x) and 2.42.0 (2.x) are vulnerable to Sensitive Data Exposure. Invalid API requests to the login endpoint may return information about the first user in the database. This can be used alongside other attacks for credential theft. ## Recommendation If you're using `loopback` 3.x upgrade to version 3.26.0 or later. If you're using `loopback` 2.x upgrade to version 2.42.0 or later.
null
2021-09-27T22:31:27Z
2020-09-02T21:49:48Z
LOW
null
{'CWE-200'}
{'https://github.com/strongloop/loopback/issues/4195', 'https://loopback.io/doc/en/sec/Security-advisory-06-17-2019.html', 'https://www.npmjs.com/advisories/915', 'https://github.com/strongloop/loopback'}
null
npm
GHSA-x6ch-c6rv-f7wh
Malicious Package in asymc
All versions of `asymc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T13:46:49Z
2020-09-02T18:34:22Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/841'}
null
npm
GHSA-4pf7-579w-f4gm
Downloads Resources over HTTP in dwebp-bin
Affected versions of `dwebp-bin` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `dwebp-bin`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10633'}
2021-09-16T20:55:09Z
2019-02-18T23:57:04Z
HIGH
null
{'CWE-269', 'CWE-311'}
{'https://github.com/advisories/GHSA-4pf7-579w-f4gm', 'https://www.npmjs.com/advisories/232', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10633', 'https://github.com/1000ch/dwebp-bin', 'https://nodesecurity.io/advisories/232'}
null
npm
GHSA-wpvm-wqr4-p7cw
Inclusion of Functionality from Untrusted Control Sphere in CKEditor 4
It was possible to execute a ReDoS-type attack inside CKEditor 4 before 4.16 by persuading a victim to paste crafted URL-like text into the editor, and then press Enter or Space (in the Autolink plugin).
{'CVE-2021-26272'}
2022-02-08T21:39:05Z
2021-10-13T15:34:09Z
MODERATE
null
{'CWE-829'}
{'https://ckeditor.com/blog/CKEditor-4.16-with-improved-image-pasting-High-Contrast-support-and-a-new-color-API/#security-comes-first', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26272', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-416', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/ckeditor/ckeditor4'}
null
npm
GHSA-93q8-gq69-wqmw
Inefficient Regular Expression Complexity in chalk/ansi-regex
ansi-regex is vulnerable to Inefficient Regular Expression Complexity
{'CVE-2021-3807'}
2022-04-26T21:00:26Z
2021-09-20T20:20:09Z
HIGH
null
{'CWE-1333'}
{'https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/chalk/ansi-regex/releases/tag/v6.0.1', 'https://github.com/chalk/ansi-regex', 'https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774', 'https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311', 'https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994', 'https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3807'}
null
npm
GHSA-r6rj-9ch6-g264
Prototype pollution in Merge-deep
The merge-deep library before 3.0.3 for Node.js can be tricked into overwriting properties of Object.prototype or adding new properties to it. These properties are then inherited by every object in the program, thus facilitating prototype-pollution attacks against applications using this library.
{'CVE-2021-26707'}
2021-06-16T19:58:45Z
2021-06-07T22:09:26Z
CRITICAL
null
{'CWE-1321'}
{'https://www.npmjs.com/package/merge-deep', 'https://securitylab.github.com/advisories/GHSL-2020-160-merge-deep/', 'https://github.com/jonschlinkert/merge-deep/commit/11e5dd56de8a6aed0b1ed022089dbce6968d82a5', 'https://security.netapp.com/advisory/ntap-20210716-0008/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26707'}
null
npm
GHSA-c4qp-h3m6-785f
Downloads Resources over HTTP in ibm_db
Affected versions of `ibm_db` insecurely download resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation Update to version 1.0.2 or later.
{'CVE-2016-10577'}
2021-01-08T19:01:22Z
2019-02-18T23:51:59Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10577', 'https://github.com/advisories/GHSA-c4qp-h3m6-785f', 'https://github.com/ibmdb/node-ibm_db/commit/d7e2d4b4cbeb6f067df8bba7d0b2ac5d40fcfc19#diff-315091eb1586966006e05ebc21cd2a94', 'https://nodesecurity.io/advisories/163', 'https://www.npmjs.com/advisories/163'}
null
npm
GHSA-5wqj-f379-6jh4
Command injection in kill-process-on-port
All versions of package kill-process-on-port are vulnerable to Command Injection via a.getProcessPortId.
{'CVE-2020-28426'}
2021-03-16T01:08:14Z
2021-03-19T21:19:47Z
HIGH
null
{'CWE-77'}
{'https://snyk.io/vuln/SNYK-JS-KILLPROCESSONPORT-1055458', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28426'}
null
npm
GHSA-8f93-rv4p-x4jw
SQL Injection in sql
All versions of `sql` are vulnerable to sql injection as it does not properly escape parameters when building SQL queries. ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not install or use this module until a fix is available.
null
2020-08-31T18:31:48Z
2019-06-12T16:36:52Z
MODERATE
null
{'CWE-89'}
{'https://hackerone.com/reports/319465', 'https://www.npmjs.com/advisories/662', 'https://nodesecurity.io/advisories/662'}
null
npm
GHSA-m7j4-fhg6-xf5v
Prototype pollution in datatables.net
All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.
{'CVE-2020-28458'}
2021-01-08T21:20:46Z
2020-12-17T21:00:50Z
HIGH
null
{'CWE-1321'}
{'https://github.com/DataTables/Dist-DataTables/blob/master/js/jquery.dataTables.js%23L2766', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1051961', 'https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1051962', 'https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806', 'https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28458'}
null
npm
GHSA-785g-gx74-gr39
Malicious Package in js-wha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-10-01T14:35:20Z
2020-09-03T23:12:48Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1294'}
null
npm
GHSA-6c9x-mj3g-h47x
Spoofing attack in swagger-ui-dist
The swagger-ui-dist package before 4.1.3 for Node.js could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim.
{'CVE-2021-46708'}
2022-03-29T19:10:02Z
2022-03-12T00:00:36Z
MODERATE
null
{'CWE-1021'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-46708', 'https://security.snyk.io/vuln/SNYK-JS-SWAGGERUIDIST-2314884', 'https://security.netapp.com/advisory/ntap-20220407-0004/', 'https://www.npmjs.com/package/swagger-ui-dist/v/4.1.3', 'https://github.com/swagger-api/swagger-ui'}
null
npm
GHSA-rrrm-qjm4-v8hf
Inefficient Regular Expression Complexity in marked
### Impact _What kind of vulnerability is it?_ Denial of service. The regular expression `block.def` may cause catastrophic backtracking against some strings. PoC is the following. ```javascript import * as marked from "marked"; marked.parse(`[x]:${' '.repeat(1500)}x ${' '.repeat(1500)} x`); ``` _Who is impacted?_ Anyone who runs untrusted markdown through marked and does not use a worker with a time limit. ### Patches _Has the problem been patched?_ Yes _What versions should users upgrade to?_ 4.0.10 ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ Do not run untrusted markdown through marked or run marked on a [worker](https://marked.js.org/using_advanced#workers) thread and set a reasonable time limit to prevent draining resources. ### References _Are there any links users can visit to find out more?_ - https://marked.js.org/using_advanced#workers - https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS ### For more information If you have any questions or comments about this advisory: * Open an issue in [marked](https://github.com/markedjs/marked)
{'CVE-2022-21680'}
2022-01-14T19:56:20Z
2022-01-14T21:04:41Z
HIGH
null
{'CWE-1333'}
{'https://github.com/markedjs/marked/releases/tag/v4.0.10', 'https://github.com/markedjs/marked', 'https://github.com/markedjs/marked/commit/c4a3ccd344b6929afa8a1d50ac54a721e57012c0', 'https://github.com/markedjs/marked/security/advisories/GHSA-rrrm-qjm4-v8hf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21680'}
null
npm
GHSA-x6hx-7gh3-3q98
Prototype Pollution in mootools
This affects all versions of package mootools. This is due to the ability to pass untrusted input to Object.merge()
{'CVE-2021-23432'}
2021-08-25T18:25:11Z
2021-09-02T17:09:30Z
MODERATE
null
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-MOOTOOLS-1325536', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23432', 'https://github.com/vsviridov/mootools-node'}
null
npm
GHSA-52r9-g5g6-2hjp
Path Traversal in node-srv
Versions of `node-srv` before 2.1.1 are vulnerable to path traversal allowing a remote attacker to read files from the server that uses `node-srv`. ## Recommendation Update to version 2.1.1 or later.
{'CVE-2018-3714'}
2020-08-31T18:28:55Z
2018-07-26T14:50:41Z
HIGH
null
{'CWE-22'}
{'https://hackerone.com/reports/309124', 'https://www.npmjs.com/advisories/588', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3714', 'https://github.com/advisories/GHSA-52r9-g5g6-2hjp'}
null
npm
GHSA-x9hc-rw35-f44h
Sandbox Breakout / Arbitrary Code Execution in static-eval
Versions of `static-eval`prior to 2.0.2 pass untrusted user input directly to the global function constructor, resulting in an arbitrary code execution vulnerability when user input is parsed via the package. ## Proof of concept ``` var evaluate = require('static-eval'); var parse = require('esprima').parse; var src = process.argv[2]; var payload = '(function({x}){return x.constructor})({x:"".sub})("console.log(process.env)")()' var ast = parse(payload).body[0].expression; console.log(evaluate(ast, {x:1})); ``` ## Recommendation Upgrade to version 2.0.2 or later.
null
2021-09-27T13:40:52Z
2020-09-02T15:46:03Z
HIGH
null
{'CWE-94'}
{'https://snyk.io/vuln/SNYK-JS-STATICEVAL-173693', 'https://www.npmjs.com/advisories/758'}
null
npm
GHSA-q2c6-c6pm-g3gh
Arbitrary Code Execution in handlebars
Versions of `handlebars` prior to 3.0.8 or 4.5.3 are vulnerable to Arbitrary Code Execution. The package's lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript in the system. It is due to an incomplete fix for a [previous issue](https://www.npmjs.com/advisories/1316). This vulnerability can be used to run arbitrary code in a server processing Handlebars templates or on a victim's browser (effectively serving as Cross-Site Scripting). ## Recommendation Upgrade to version 3.0.8, 4.5.3 or later.
null
2020-08-31T18:55:11Z
2020-09-04T15:07:38Z
HIGH
null
null
{'https://www.npmjs.com/advisories/1324'}
null
npm
GHSA-xc7v-wxcw-j472
Memory Exposure in tunnel-agent
Versions of `tunnel-agent` before 0.6.0 are vulnerable to memory exposure. This is exploitable if user supplied input is provided to the auth value and is a number. Proof-of-concept: ```js require('request')({ method: 'GET', uri: 'http://www.example.com', tunnel: true, proxy:{ protocol: 'http:', host:'127.0.0.1', port:8080, auth:USERSUPPLIEDINPUT // number } }); ``` ## Recommendation Update to version 0.6.0 or later.
null
2020-08-31T18:29:19Z
2019-06-03T17:08:26Z
MODERATE
null
{'CWE-200'}
{'https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0', 'https://www.npmjs.com/advisories/598', 'https://gist.github.com/ChALkeR/fd6b2c445834244e7d440a043f9d2ff4'}
null
npm
GHSA-rfhr-62xp-2fp2
Open Redirect in trailing-slash
The package trailing-slash before 2.0.1 are vulnerable to Open Redirect via the use of trailing double slashes in the URL when accessing the vulnerable endpoint (such as https://example.com//attacker.example/). The vulnerable code is in index.js::createTrailing(), as the web server uses relative URLs instead of absolute URLs.
{'CVE-2021-23387'}
2021-05-27T22:38:20Z
2021-06-08T23:19:21Z
MODERATE
null
{'CWE-601'}
{'https://github.com/fardog/trailing-slash/blob/f640ece055fe85275c983de5eb94661b95e35670/index.js%23L36', 'https://github.com/fardog/trailing-slash/commit/f8e66f1429308247e5a119d430203077d8f05048', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23387', 'https://snyk.io/vuln/SNYK-JS-TRAILINGSLASH-1085707'}
null
npm
GHSA-f7jg-mcvw-9gwv
Directory Traversal in reecerver
Affected versions of `reecerver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16188'}
2020-08-31T18:23:21Z
2018-07-23T20:40:40Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16188', 'https://github.com/advisories/GHSA-f7jg-mcvw-9gwv', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/reecerver', 'https://nodesecurity.io/advisories/443', 'https://www.npmjs.com/advisories/443'}
null
npm
GHSA-mm7h-323r-9p4g
Downloads Resources over HTTP in imageoptim
imageoptim is a Node.js wrapper for some images compression algorithms. imageoptim downloads zipped resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested tarball with an attacker controlled tarball if the attacker is on the network or positioned in between the user and the remote server. ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this time.
{'CVE-2016-10596'}
2020-08-31T18:14:15Z
2019-02-18T23:50:33Z
HIGH
null
{'CWE-311'}
{'https://nodesecurity.io/advisories/194', 'https://www.npmjs.com/advisories/194', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10596', 'https://github.com/advisories/GHSA-mm7h-323r-9p4g'}
null
npm
GHSA-4qwq-q4pr-rr7r
Vulnerability in packageCmd function leads to arbitrary code execution via filePath parameters
aaptjs is a node wraper for aapt. An issue was discovered in the packageCmd function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.
{'CVE-2020-36378'}
2022-05-04T03:45:26Z
2021-11-02T15:42:38Z
CRITICAL
null
{'CWE-77', 'CWE-78'}
{'https://github.com/shenzhim/aaptjs/issues/2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36378', 'https://github.com/shenzhim/aaptjs'}
null
npm
GHSA-jg8v-48h5-wgxg
Prototype Pollution
This affects the package jszip before 3.7.0. Crafting a new zip file with filenames set to Object prototype values (e.g __proto__, toString, etc) results in a returned object with a modified prototype instance.
{'CVE-2021-23413'}
2021-08-31T20:58:01Z
2021-08-10T16:02:18Z
MODERATE
null
{'CWE-1321'}
{'https://github.com/Stuk/jszip/commit/22357494f424178cb416cdb7d93b26dd4f824b36', 'https://snyk.io/vuln/SNYK-JS-JSZIP-1251497', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23413', 'https://github.com/Stuk/jszip', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1251498', 'https://github.com/Stuk/jszip/blob/master/lib/object.js%23L88', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1251499', 'https://github.com/Stuk/jszip/pull/766'}
null
npm
GHSA-r5xw-q988-826m
Remote Memory Exposure in mongoose
Versions of `mongoose` before 4.3.6, 3.8.39 are vulnerable to remote memory exposure. Trying to save a number to a field of type Buffer on the affected mongoose versions allocates a chunk of uninitialized memory and stores it in the database. ## Recommendation Update to version 4.3.6, 3.8.39 or later.
null
2021-09-23T21:51:49Z
2020-09-01T19:39:37Z
MODERATE
null
{'CWE-201'}
{'https://www.npmjs.com/advisories/599', 'https://gist.github.com/ChALkeR/440bc3dfcbd9b6da75c3', 'https://github.com/Automattic/mongoose/issues/3764', 'https://gist.github.com/ChALkeR/d4a8055625221b6e65f0'}
null
npm
GHSA-xj3h-vc9j-j823
Directory Traversal in nodeaaaaa
Affected versions of `nodeaaaaa` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16223'}
2020-08-31T18:23:28Z
2018-07-23T20:39:32Z
HIGH
null
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/nodeaaaaa', 'https://nodesecurity.io/advisories/446', 'https://www.npmjs.com/advisories/446', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16223', 'https://github.com/advisories/GHSA-xj3h-vc9j-j823'}
null
npm
GHSA-cfm4-qjh2-4765
Improper Verification of Cryptographic Signature in node-forge
### Impact RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used. ### Patches The issue has been addressed in `node-forge` `1.3.0`. ### References For more information, please see ["Bleichenbacher's RSA signature forgery based on implementation error"](https://mailarchive.ietf.org/arch/msg/openpgp/5rnE9ZRN1AokBVj3VqblGlP63QE/) by Hal Finney. ### For more information If you have any questions or comments about this advisory: * Open an issue in [forge](https://github.com/digitalbazaar/forge) * Email us at [example email address](mailto:security@digitalbazaar.com)
{'CVE-2022-24771'}
2022-03-18T23:09:54Z
2022-03-18T23:09:54Z
HIGH
null
{'CWE-347'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24771', 'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1', 'https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765', 'https://github.com/digitalbazaar/forge', 'https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2'}
null
npm
GHSA-jpcq-cgw6-v4j6
Potential XSS vulnerability in jQuery
### Impact Passing HTML containing `<option>` elements from untrusted sources - even after sanitizing them - to one of jQuery's DOM manipulation methods (i.e. `.html()`, `.append()`, and others) may execute untrusted code. ### Patches This problem is patched in jQuery 3.5.0. ### Workarounds To workaround this issue without upgrading, use [DOMPurify](https://github.com/cure53/DOMPurify) with its `SAFE_FOR_JQUERY` option to sanitize the HTML string before passing it to a jQuery method. ### References https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ ### For more information If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery repo](https://github.com/jquery/jquery/issues). If you don't find an answer, open a new issue.
{'CVE-2020-11023'}
2022-02-08T22:06:24Z
2020-04-29T22:19:14Z
MODERATE
null
{'CWE-79'}
{'https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/ra32c7103ded9041c7c1cb8c12c8d125a6b2f3f3270e2937ef8417fac@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r094f435595582f6b5b24b66fedf80543aa8b1d57a3688fbcc21f06ec@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r2c85121a47442036c7f8353a3724aa04f8ecdfda1819d311ba4f5330@%3Cdev.felix.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html', 'https://lists.apache.org/thread.html/r6c4df3b33e625a44471009a172dabe6865faec8d8f21cac2303463b1@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/radcb2aa874a79647789f3563fcbbceaf1045a029ee8806b59812a8ea@%3Cissues.hive.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/rf0f8939596081d84be1ae6a91d6248b96a02d8388898c372ac807817@%3Cdev.felix.apache.org%3E', 'https://www.drupal.org/sa-core-2020-002', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/', 'https://lists.apache.org/thread.html/r55f5e066cc7301e3630ce90bbbf8d28c82212ae1f2d4871012141494@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/r07ab379471fb15644bf7a92e4a98cbc7df3cf4e736abae0cc7625fe6@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/ra406b3adfcffcb5ce8707013bdb7c35e3ffc2776a8a99022f15274c6@%3Cissues.hive.apache.org%3E', 'https://www.tenable.com/security/tns-2021-10', 'https://lists.apache.org/thread.html/r6e97b37963926f6059ecc1e417721608723a807a76af41d4e9dbed49@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r9006ad2abf81d02a0ef2126bab5177987e59095b7194a487c4ea247c@%3Ccommits.felix.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html', 'https://lists.apache.org/thread.html/r1fed19c860a0d470f2a3eded12795772c8651ff583ef951ddac4918c@%3Cgitbox.hive.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/', 'https://jquery.com/upgrade-guide/3.5/', 'https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r9e0bd31b7da9e7403478d22652b8760c946861f8ebd7bd750844898e@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/rd38b4185a797b324c8dd940d9213cf99fcdc2dbf1fc5a63ba7dee8c9@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r9c5fda81e4bca8daee305b4c03283dddb383ab8428a151d4cb0b3b15@%3Cissues.hive.apache.org%3E', 'https://github.com/jquery/jquery/releases/tag/3.5.0', 'https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/ra3c9219fcb0b289e18e9ec5a5ebeaa5c17d6b79a201667675af6721c@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r0593393ca1e97b1e7e098fe69d414d6bd0a467148e9138d07e86ebbb@%3Cissues.hive.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html', 'https://security.netapp.com/advisory/ntap-20200511-0006/', 'https://lists.apache.org/thread.html/rf661a90a15da8da5922ba6127b3f5f8194d4ebec8855d60a0dd13248@%3Cdev.hive.apache.org%3E', 'https://www.debian.org/security/2020/dsa-4693', 'https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/r4aadb98086ca72ed75391f54167522d91489a0d0ae25b12baa8fc7c5@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rb25c3bc7418ae75cba07988dafe1b6912f76a9dd7d94757878320d61@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r4dba67be3239b34861f1b9cfdf9dfb3a90272585dcce374112ed6e16@%3Cdev.felix.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760@%3Cissues.flink.apache.org%3E', 'https://security.gentoo.org/glsa/202007-03', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11023', 'https://www.tenable.com/security/tns-2021-02', 'https://lists.apache.org/thread.html/r3702ede0ff83a29ba3eb418f6f11c473d6e3736baba981a8dbd9c9ef@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67@%3Cdev.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/', 'https://lists.apache.org/thread.html/rb69b7d8217c1a6a2100247a5d06ce610836b31e3f5d73fc113ded8e7@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rab82dd040f302018c85bd07d33f5604113573514895ada523c3401d9@%3Ccommits.hive.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/ra374bb0299b4aa3e04edde01ebc03ed6f90cf614dad40dd428ce8f72@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rf1ba79e564fe7efc56aef7c986106f1cf67a3427d08e997e088e7a93@%3Cgitbox.hive.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html', 'https://blog.jquery.com/2020/04/10/jquery-3-5-0-released', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://github.com/jquery/jquery', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html', 'https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E'}
null
npm
GHSA-x6m6-5hrf-fh6r
Denial of Service in markdown-it-toc-and-anchor
All versions of `markdown-it-toc-and-anchor` are vulnerable to Denial of Service. Parsing markdown containing `**text**+\n@[toc]` causes the application to enter and infinite loop. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2021-09-24T22:05:24Z
2020-09-01T21:26:50Z
HIGH
null
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JS-MARKDOWNITTOCANDANCHOR-73500', 'https://www.npmjs.com/advisories/749', 'https://github.com/medfreeman/markdown-it-toc-and-anchor'}
null
npm
GHSA-qqgx-2p2h-9c37
Prototype Pollution
### Overview The `ini` npm package before version 1.3.6 has a Prototype Pollution vulnerability. If an attacker submits a malicious INI file to an application that parses it with `ini.parse`, they will pollute the prototype on the application. This can be exploited further depending on the context. ### Patches This has been patched in 1.3.6 ### Steps to reproduce payload.ini ``` [__proto__] polluted = "polluted" ``` poc.js: ``` var fs = require('fs') var ini = require('ini') var parsed = ini.parse(fs.readFileSync('./payload.ini', 'utf-8')) console.log(parsed) console.log(parsed.__proto__) console.log(polluted) ``` ``` > node poc.js {} { polluted: 'polluted' } { polluted: 'polluted' } polluted ```
{'CVE-2020-7788'}
2021-07-28T21:11:23Z
2020-12-10T16:53:45Z
HIGH
null
{'CWE-1321'}
{'https://lists.debian.org/debian-lts-announce/2020/12/msg00032.html', 'https://snyk.io/vuln/SNYK-JS-INI-1048974', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7788', 'https://www.npmjs.com/advisories/1589', 'https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1'}
null
npm
GHSA-9xww-fwh9-95c5
Malicious Package in uglyfi-js
Version 3.4.6 of `uglyfi-js` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T21:56:44Z
2020-09-02T21:43:59Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/911'}
null
npm
GHSA-5854-jvxx-2cg9
Denial of Service in subtext
Versions of `subtext` >=4.1.0 are vulnerable to Denial of Service. The Content-Encoding HTTP header parser has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. Because hapi rethrows system errors (as opposed to catching expected application errors), the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services. ## Recommendation This package is deprecated and is now maintained as `@hapi/subtext`. Please update your dependencies to use `@hapi/subtext`.
null
2020-08-31T19:00:47Z
2020-09-03T15:46:57Z
HIGH
null
null
{'https://www.npmjs.com/advisories/1478'}
null
npm
GHSA-79p8-4cwq-rhqh
Directory Traversal in jn_jj_server
Affected versions of `jn_jj_server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16210'}
2020-08-31T18:22:36Z
2018-07-23T20:40:07Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/424', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16210', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/jn_jj_server', 'https://github.com/advisories/GHSA-79p8-4cwq-rhqh', 'https://nodesecurity.io/advisories/424'}
null
npm
GHSA-ff5x-w9wg-h275
Holder can generate proof of ownership for credentials it does not control in vp-toolkit
### Impact The [`verifyVerifiablePresentation()`](https://github.com/rabobank-blockchain/vp-toolkit/blob/master/src/service/signers/verifiable-presentation-signer.ts#L97) method check the cryptographic integrity of the Verifiable Presentation, but it does not check if the [`credentialSubject.id`](https://github.com/rabobank-blockchain/vp-toolkit-models/blob/develop/src/model/verifiable-credential.ts#L150) DID matches the signer of the VP proof. The **verifier** is impacted by this vulnerability. ### Patches Patch will be available in version 0.2.2. ### Workarounds - Compute the address out of the `verifiablePresentation.proof.n.verificationMethod` using `getAddressFromPubKey()` from `crypt-util@0.1.5` and match it with the `credentialSubject.id` address from the credential. ### References [Github issue](https://github.com/rabobank-blockchain/vp-toolkit/issues/14) ### For more information If you have any questions or comments about this advisory: * Discuss in the existing [issue](https://github.com/rabobank-blockchain/vp-toolkit/issues/14) * [Contact me](https://github.com/rabomarnix)
null
2020-02-28T16:38:18Z
2020-03-06T01:15:46Z
HIGH
null
null
{'https://github.com/rabobank-blockchain/vp-toolkit/security/advisories/GHSA-ff5x-w9wg-h275', 'https://github.com/rabobank-blockchain/vp-toolkit/commit/18a7db84d3265c6ffa10ef63eb37ae1bd4ba192b', 'https://github.com/rabobank-blockchain/vp-toolkit/issues/14'}
null
npm
GHSA-f9cv-665r-275h
Prototype Pollution in merge-change
All current versions of package merge-change are vulnerable to Prototype Pollution via the utils.set function.
{'CVE-2021-23421'}
2021-08-30T19:27:27Z
2021-09-01T18:36:01Z
CRITICAL
null
{'CWE-915'}
{'https://snyk.io/vuln/SNYK-JS-MERGECHANGE-1310985', 'https://github.com/VladimirShestakov/merge-change/blob/9901f145e06158f284f52de42e6ba5b0f702fb65/utils.js#L89-L123', 'https://github.com/VladimirShestakov/merge-change', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23421'}
null
npm
GHSA-gvff-25cc-4f66
Path Traversal in restify-swagger-jsdoc
Versions of `restify-swagger-jsdoc` prior to 3.2.1 are vulnerable to Path Traversal. The package fails to properly sanitize URLs, which may allow attackers to access server files outside the `swagger-ui` folder by using relative paths. ## Recommendation Upgrade to version 3.2.1 or later.
null
2020-08-31T18:44:58Z
2020-09-03T17:15:56Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/1037'}
null
npm
GHSA-gm8g-xhh8-rmwr
Prototype Pollution in doc-path
This affects the package doc-path before 2.1.2.
{'CVE-2020-7772'}
2021-04-19T22:22:45Z
2021-05-10T19:17:25Z
CRITICAL
null
{'CWE-1321'}
{'https://github.com/mrodrig/doc-path/commit/3e2bb168cf303bffcd7fae5f8d05e5300c1541c7', 'https://snyk.io/vuln/SNYK-JS-DOCPATH-1011952', 'https://github.com/mrodrig/doc-path/blob/stable/src/path.js%23L54', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7772'}
null
npm
GHSA-h9jc-284h-533g
Context isolation bypass via contextBridge in Electron
### Impact Apps using both `contextIsolation` and `contextBridge` are affected. This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. ### Workarounds There are no app-side workarounds, you must update your Electron version to be protected. ### Fixed Versions * `9.0.0-beta.21` * `8.2.4` * `7.2.4` ### For more information If you have any questions or comments about this advisory: * Email us at [security@electronjs.org](mailto:security@electronjs.org)
{'CVE-2020-4077'}
2021-01-07T23:48:28Z
2020-07-07T00:01:10Z
HIGH
null
{'CWE-501'}
{'https://github.com/electron/electron/security/advisories/GHSA-h9jc-284h-533g', 'https://github.com/electron/electron/commit/b8e347709245d2dc5640fbb3044d9b21b4eaa6b0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4077', 'https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824'}
null
npm
GHSA-qfxv-qqvg-24pg
OS Command Injection in im-metadata
im-metadata through 3.0.1 allows remote attackers to execute arbitrary commands via the "exec" argument. It is possible to inject arbitrary commands as part of the metadata options which is given to the "exec" function.
{'CVE-2019-10788'}
2021-03-29T22:57:19Z
2021-04-13T15:17:36Z
HIGH
null
{'CWE-78'}
{'https://github.com/Turistforeningen/node-im-metadata/commit/ea15dddbe0f65694bfde36b78dd488e90f246639', 'https://snyk.io/vuln/SNYK-JS-IMMETADATA-544184', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10788'}
null
npm
GHSA-2p99-6f47-8x9j
Malicious Package in asnc
All versions of `asnc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T13:55:37Z
2020-09-02T18:38:39Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/845'}
null
npm
GHSA-wq7q-7vfh-2x3h
Downloads Resources over HTTP in install-nw
Affected versions of `install-nw` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `install-nw`. ## Recommendation Update to version 1.1.5 or later.
{'CVE-2016-10566'}
2021-01-08T01:38:47Z
2019-02-18T23:54:09Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10566', 'https://github.com/advisories/GHSA-wq7q-7vfh-2x3h', 'https://nodesecurity.io/advisories/204', 'https://www.npmjs.com/advisories/204'}
null
npm
GHSA-wpg7-2c88-r8xv
Exposure of Sensitive Information in simple-get
In versions of simple-get prior to 4.0.1, 3.1.1, and 2.8.2, when fetching a remote url with a cookie location response, headers will be followed, potentially resulting in an exposure of the session cookie to a third party.
{'CVE-2022-0355'}
2022-02-03T16:08:56Z
2022-01-28T22:54:16Z
HIGH
null
{'CWE-200'}
{'https://github.com/feross/simple-get/commit/e4af095e06cd69a9235013e8507e220a79b9684f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0355', 'https://github.com/feross/simple-get/pull/76#issuecomment-1027754710', 'https://huntr.dev/bounties/42c79c23-6646-46c4-871d-219c0d4b4e31', 'https://github.com/feross/simple-get/pull/75#issuecomment-1027755026', 'https://github.com/feross/simple-get/'}
null
npm
GHSA-39qv-prmh-x37f
Prototype Pollution in @strikeentco/set
This affects the package @strikeentco/set before 1.0.2. It allows an attacker to cause a denial of service and may lead to remote code execution. **Note:** This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-STRIKEENTCOSET-1038821
{'CVE-2021-23497'}
2022-02-11T16:16:33Z
2022-02-05T00:00:26Z
HIGH
null
{'CWE-1321'}
{'https://github.com/strikeentco/set/commit/b2f942c', 'https://snyk.io/blog/remediate-javascript-type-confusion-bypassed-input-validation/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23497', 'https://github.com/strikeentco/set/', 'https://security.snyk.io/vuln/SNYK-JS-STRIKEENTCOSET-1038821', 'https://snyk.io/vuln/SNYK-JS-STRIKEENTCOSET-2385945'}
null
npm
GHSA-wwrj-35w6-77ff
CSRF vulnerability in save-server
### Impact Versions prior to version v1.05 are affected by a CSRF vulnerability, as there is no CSRF mitigation (Tokens etc.). The fix introduced in version v1.05 unintentionally breaks uploading so version v1.0.7 is the fixed version. This is patched by implementing [Double submit](https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f). The CSRF attack would require you to navigate to a malicious site while you have an active session with Save-Server (Session key stored in cookies). The malicious user would then be able to perform some actions, including: - Upload file - Delete file - Add redirect #### If you are logged in as root, this attack is significantly more severe. They can (in addition to the above): - Create users - Delete users - Update users (change password) If they updated the password of a user, that user's files would then be available. If the root password is updated, all files would be visible if they logged in with the new password. Note that due to the same origin policy malicious actors cannot view the gallery or the response of any of the methods, nor be sure they succeeded. ### Patches This issue has been patched. Update to version v1.0.7 or above to benefit from this fix. ### Workarounds None. You should upgrade. ### References What is CSRF: https://owasp.org/www-community/attacks/csrf Fix type: https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f ### For more information If you have any questions or comments about this advisory: * Open an issue in [Save-server](https://github.com/Neztore/save-server/) * Email us at [hi@nezto.re](mailto:hi@nezto.re) * Join our discord (preferred): [Invite](https://discord.gg/QevWabU)
{'CVE-2020-15135'}
2021-01-07T23:42:18Z
2020-08-04T14:54:08Z
MODERATE
null
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15135', 'https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f', 'https://www.npmjs.com/package/save-server', 'https://github.com/Neztore/save-server/security/advisories/GHSA-wwrj-35w6-77ff'}
null
npm
GHSA-qr32-j4j6-3m7r
Command Injection in fs-git
Affected versions of `fs-git` do not sanitize strings passed into the `buildCommand` method, resulting in arbitrary code execution. ## Recommendation Update to version 1.0.2 or later.
{'CVE-2017-16087'}
2020-08-31T18:20:27Z
2019-05-29T20:23:00Z
HIGH
null
{'CWE-77'}
{'https://github.com/vvakame/fs-git/commit/eb5f70efa5cfbff1ab299fa7daaa5de549243998', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16087', 'https://www.npmjs.com/advisories/360', 'https://github.com/vvakame/fs-git/commit/eb5f70efa5cfbff1ab299fa7daaa5de549243998#diff-13b5b151431c7e7a17f273559ed212d5'}
null
npm
GHSA-pvv8-8fx9-h673
Path Traversal in @backstage/plugin-scaffolder-backend
### Impact A malicious actor could read sensitive files from the environment where Scaffolder tasks are run. The attack is executed by crafting a custom Scaffolder template with a `publish:github:pull-request` action using a particular source path. When the template is executed the sensitive files would be included in the published pull request. This vulnerability is mitigated by the fact that an attacker would need access to create and register templates in the Backstage catalog, and that the attack is very visible given that the exfiltration happens via a pull request. ### Patches The vulnerability is patched in the `0.15.9` release of `@backstage/plugin-scaffolder-backend`. ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Backstage repository](https://github.com/backstage/backstage) * Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
{'CVE-2021-41151'}
2021-10-25T20:07:48Z
2021-10-19T15:28:03Z
MODERATE
null
{'CWE-22'}
{'https://github.com/backstage/backstage/security/advisories/GHSA-pvv8-8fx9-h673', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41151', 'https://github.com/backstage/backstage', 'https://github.com/backstage/backstage/commit/6968962c920508eae19a4c1c200fa2c8980a4006', 'https://github.com/backstage/backstage/releases/tag/release-2021-10-16'}
null
npm
GHSA-353r-3v84-9pjj
Malicious Package in nothing-js
`nothing-js` contained a malicious script that attempted to delete all files when `npm test` was run. ## Recommendation This module has been unpublished from the npm Registry. If you find this module in your environment remove it.
null
2021-10-01T13:25:56Z
2020-09-01T20:40:36Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/650'}
null
npm
GHSA-wfw3-rgfr-6g67
XSS via Angular Expression in ag-grid
Affected versions of `ag-grid` are vulnerable to Cross-site Scripting (XSS) via Angular Expressions, if used in combination with AngularJS. ## Recommendation Avoid using `ag-grid` in combination with AngularJS until a fix is available.
{'CVE-2017-16009'}
2020-08-31T18:19:26Z
2020-09-01T16:40:42Z
MODERATE
null
{'CWE-79'}
{'https://nodesecurity.io/advisories/327', 'https://github.com/ceolter/ag-grid/issues/1287', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16009', 'https://www.npmjs.com/advisories/327', 'https://spring.io/blog/2016/01/28/angularjs-escaping-the-expression-sandbox-for-xss'}
null
npm
GHSA-8mgg-5x65-m4m4
Command Injection in soletta-dev-app
All versions of `soletta-dev-app` are vulnerable to Command Injection. The package does not validate user input on the `/api/service/status` API endpoint, passing contents of the `service` query parameter to an exec call. This may allow attackers to run arbitrary commands in the system. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2020-08-31T18:41:59Z
2020-09-11T21:08:19Z
HIGH
null
{'CWE-77'}
{'https://www.npmjs.com/advisories/958'}
null
npm
GHSA-954c-jjx6-cxv7
Reflected XSS from the callback handler's error query parameter
### Overview Versions before and including `1.4.1` are vulnerable to reflected XSS. An attacker can execute arbitrary code by providing an XSS payload in the `error` query parameter which is then processed by the callback handler as an error message. ### Am I affected? You are affected by this vulnerability if you are using `@auth0/nextjs-auth0` version `1.4.1` or lower **unless** you are using custom error handling that does not return the error message in an HTML response. ### How to fix that? Upgrade to version `1.4.2`. ### Will this update impact my users? The fix adds basic HTML escaping to the error message and it should not impact your users. ### Credit https://github.com/inian https://github.com/git-ishanpatel
{'CVE-2021-32702'}
2021-06-28T19:06:42Z
2021-06-28T16:46:41Z
HIGH
null
{'CWE-79'}
{'https://github.com/auth0/nextjs-auth0/security/advisories/GHSA-954c-jjx6-cxv7', 'https://www.npmjs.com/package/@auth0/nextjs-auth0', 'https://github.com/auth0/nextjs-auth0/commit/6996e2528ceed98627caa28abafbc09e90163ccf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32702'}
null
npm
GHSA-5p5w-j3g7-w4wv
Authentication bypass via incorrect XML canonicalization and DOM traversal in saml2-js
Versions of `saml2-js` prior to 1.12.4 or 2.0.2 are vulnerable to authentication bypass. The `saml2-js` library may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers. Security Assertion Markup Language (SAML) is an XML-based markup language for security assertions regarding authentication and permissions, most commonly used for single sign-on (SSO) services. Some XML DOM traversal and canonicalization APIs may be inconsistent in handling of comments within XML nodes. Incorrect use of these APIs by some SAML libraries results in incorrect parsing of the inner text of XML nodes such that any inner text after the comment is lost prior to cryptographically signing the SAML message. Text after the comment therefore has no impact on the signature on the SAML message. A remote attacker can modify SAML content for a SAML service provider without invalidating the cryptographic signature, which may allow attackers to bypass primary authentication for the affected SAML service provider ## Recommendation If you use 1.x upgrade to version 1.12.4 or greater If you use 2.x upgrade to version 2.02 or greater
{'CVE-2017-11429'}
2021-06-11T14:24:18Z
2019-07-05T21:11:18Z
MODERATE
null
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-11429', 'https://www.npmjs.com/advisories/567', 'https://github.com/advisories/GHSA-5p5w-j3g7-w4wv', 'https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations', 'https://www.kb.cert.org/vuls/id/475445'}
null
npm
GHSA-97gv-3p2c-xw7j
Denial of Service and Content Injection in i18n-node-angular
Versions of `i18n-node-angular` prior to 1.4.0 are affected by denial of service and cross-site scripting vulnerabilities. The vulnerabilities exist in a REST endpoint that was created for development purposes, but was not disabled in production in affected versions. ## Recommendation Update to version 1.4.0 or later.
{'CVE-2016-10524'}
2022-02-11T17:08:46Z
2019-02-18T23:39:06Z
HIGH
null
{'CWE-74', 'CWE-400'}
{'https://github.com/advisories/GHSA-97gv-3p2c-xw7j', 'https://github.com/oliversalzburg/i18n-node-angular/commit/877720d2d9bb90dc8233706e81ffa03f99fc9dc8', 'https://nodesecurity.io/advisories/80', 'https://github.com/oliversalzburg/i18n-node-angular', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10524', 'https://www.npmjs.com/advisories/80'}
null
npm
GHSA-w7jg-972m-rphv
Directory Traversal in susu-sum
Affected versions of `susu-sum` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16199'}
2020-08-31T18:22:48Z
2020-09-01T18:17:28Z
HIGH
null
{'CWE-22'}
{'https://nodesecurity.io/advisories/429', 'https://www.npmjs.com/advisories/429', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16199', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/susu-sum'}
null
npm
GHSA-h2jv-5v3f-7m7j
Downloads Resources over HTTP in adamvr-geoip-lite
Affected versions of `adamvr-geoip-lite` insecurely download resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. This could impact the integrity and availability of the data being used to make geolocation decisions by an application. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10680'}
2021-01-14T15:57:07Z
2020-09-01T16:10:03Z
MODERATE
null
{'CWE-311'}
{'https://nodesecurity.io/advisories/283', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10680', 'https://www.npmjs.com/advisories/283'}
null
npm
GHSA-4g7x-7vgq-3j28
Vulnerability in list function leads to arbitrary code execution via filePath parameters
aaptjs is a node wraper for aapt. An issue was discovered in the list function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.
{'CVE-2020-36376'}
2022-05-04T03:46:28Z
2021-11-02T15:42:16Z
CRITICAL
null
{'CWE-77', 'CWE-78'}
{'https://github.com/shenzhim/aaptjs/issues/2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36376', 'https://github.com/shenzhim/aaptjs'}
null
npm
GHSA-gr4j-r575-g665
Cross-Site Scripting in highcharts
Versions of `highcharts` prior to 7.2.2 or 8.1.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize `href` values and does not restrict URL schemes, allowing attackers to execute arbitrary JavaScript in a victim's browser if they click the link.
null
2021-09-23T19:06:33Z
2020-08-25T14:04:47Z
HIGH
null
{'CWE-79'}
{'https://github.com/highcharts/highcharts/issues/13559', 'https://www.npmjs.com/advisories/1227', 'https://snyk.io/vuln/SNYK-JS-HIGHCHARTS-571995', 'https://github.com/highcharts/highcharts'}
null
npm
GHSA-fvqr-27wr-82fm
Prototype Pollution in lodash
Versions of `lodash` before 4.17.5 are vulnerable to prototype pollution. The vulnerable functions are 'defaultsDeep', 'merge', and 'mergeWith' which allow a malicious user to modify the prototype of `Object` via `__proto__` causing the addition or modification of an existing property that will exist on all objects. ## Recommendation Update to version 4.17.5 or later.
{'CVE-2018-3721'}
2020-08-31T18:28:28Z
2018-07-26T15:14:52Z
LOW
null
{'CWE-471'}
{'https://hackerone.com/reports/310443', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3721', 'https://security.netapp.com/advisory/ntap-20190919-0004/', 'https://github.com/lodash/lodash/commit/d8e069cc3410082e44eb18fcf8e7f3d08ebe1d4a', 'https://www.npmjs.com/advisories/577', 'https://github.com/advisories/GHSA-fvqr-27wr-82fm'}
null
npm
GHSA-8mm3-2mcj-cx6r
Malicious Package in angluar-cli
Version 0.0.3 of `angluar-cli` contains malicious code as a postinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed the package attempts to remove files and stop processes related to McAfee antivirus on macOS. ## Recommendation Remove the package from your environment and verify whether files were deleted and if processes were stopped.
null
2021-09-30T21:57:57Z
2020-09-11T21:09:24Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/918'}
null
npm
GHSA-j5jc-jf8f-86q7
Malicious Package in dictum.js
Version 1.0.5 of `dictum.js` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 1.0.5 of this module is found installed you will want to replace it with a version before or after 1.0.5. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:30:56Z
2020-09-01T20:38:30Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/640'}
null